Vulnerability Summary for the Week of December 5, 2022
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some cases, the vulnerabilities in the bulletin may not yet have assigned CVSS scores.
Vulnerabilities are based on the Common Vulnerabilities and Exposures (CVE) vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores:
- High: vulnerabilities with a CVSS base score of 7.0–10.0
- Medium: vulnerabilities with a CVSS base score of 4.0–6.9
- Low: vulnerabilities with a CVSS base score of 0.0–3.9
Entries may include additional information provided by organizations and efforts sponsored by CISA. This information may include identifying information, values, definitions, and related links. Patch information is provided when available. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.
High Vulnerabilities
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
activerecord_project -- activerecord | A possible escalation to RCE vulnerability exists when using YAML serialized columns in Active Record < 7.0.3.1, <6.1.6.1, <6.0.5.1 and <5.2.8.1 which could allow an attacker, that can manipulate data in the database (via means like SQL injection), the ability to escalate to an RCE. | 2022-12-05 | 9.8 | CVE-2022-32224 MISC MISC |
algan -- prens_student_information_system | Algan Yazılım Prens Student Information System product has an unauthenticated SQL Injection vulnerability. | 2022-12-02 | 9.8 | CVE-2022-2807 CONFIRM |
algan -- prens_student_information_system | Algan Yaz?l?m Prens Student Information System product has an authenticated Insecure Direct Object Reference (IDOR) vulnerability. | 2022-12-02 | 8.8 | CVE-2022-2808 CONFIRM |
amentotech -- workreap | The Workreap WordPress theme before 2.6.3 has a vulnerability with the notifications feature as it's possible to read any user's notification (employer or freelancer) as the notification ID is brute-forceable. | 2022-12-05 | 7.5 | CVE-2022-3846 MISC |
ami -- megarac_sp-x | MegaRAC Default Credentials Vulnerability | 2022-12-05 | 9.8 | CVE-2022-40242 MISC |
ami -- megarac_sp-x | AMI MegaRAC Redfish Arbitrary Code Execution | 2022-12-05 | 9.8 | CVE-2022-40259 MISC |
ami -- megarac_sp-x | AMI MegaRAC User Enumeration Vulnerability | 2022-12-05 | 7.5 | CVE-2022-2827 MISC |
apache -- camel | The camel-ldap component allows LDAP Injection when using the filter option. Users are recommended to either move to the Camel-Spring-Ldap component (which is not affected) or upgrade to 3.14.6 or 3.18.4. | 2022-12-05 | 9.8 | CVE-2022-45046 CONFIRM MLIST |
apache -- tapestry | ** UNSUPPORTED WHEN ASSIGNED ** Apache Tapestry 3.x allows deserialization of untrusted data, leading to remote code execution. This issue is similar to but distinct from CVE-2020-17531, which applies the the (also unsupported) 4.x version line. NOTE: This vulnerability only affects Apache Tapestry version line 3.x, which is no longer supported by the maintainer. Users are recommended to upgrade to a supported version line of Apache Tapestry. | 2022-12-02 | 9.8 | CVE-2022-46366 CONFIRM MLIST MISC |
avast -- avast | A vulnerability within the malware removal functionality of Avast and AVG Antivirus allowed an attacker with write access to the filesystem, to escalate his privileges in certain scenarios. The issue was fixed with Avast and AVG Antivirus version 22.10. | 2022-12-06 | 8.8 | CVE-2022-4173 MISC |
ayacms_project -- ayacms | AyaCMS 3.1.2 is vulnerable to Remote Code Execution (RCE). | 2022-12-07 | 9.8 | CVE-2022-45550 MISC MISC |
ayacms_project -- ayacms | AyaCMS v3.1.2 has an Arbitrary File Upload vulnerability. | 2022-12-06 | 8.8 | CVE-2022-45548 MISC |
background_management_system_project -- background_management_system | A vulnerability was found in Shaoxing Background Management System. It has been declared as critical. This vulnerability affects unknown code of the file /Default/Bd. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-214774 is the identifier assigned to this vulnerability. | 2022-12-03 | 9.8 | CVE-2022-4277 N/A N/A |
beappsmobile -- pc_keyboard_wifi\&bluetooth | PC Keyboard allows remote unauthenticated users to send instructions to the server to execute arbitrary code without any previous authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 2022-12-05 | 9.8 | CVE-2022-45479 MISC |
cacti -- cacti | Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For: <TARGETIP>`. This way the function `get_client_addr` returns the IP address of the server running Cacti. The following call to `gethostbyaddr` will resolve this IP address to the hostname of the server, which will pass the `poller` hostname check because of the default entry. After the authorization of the `remote_agent.php` file is bypassed, an attacker can trigger different actions. One of these actions is called `polldata`. The called function `poll_for_data` retrieves a few request parameters and loads the corresponding `poller_item` entries from the database. If the `action` of a `poller_item` equals `POLLER_ACTION_SCRIPT_PHP`, the function `proc_open` is used to execute a PHP script. The attacker-controlled parameter `$poller_id` is retrieved via the function `get_nfilter_request_var`, which allows arbitrary strings. This variable is later inserted into the string passed to `proc_open`, which leads to a command injection vulnerability. By e.g. providing the `poller_id=;id` the `id` command is executed. In order to reach the vulnerable call, the attacker must provide a `host_id` and `local_data_id`, where the `action` of the corresponding `poller_item` is set to `POLLER_ACTION_SCRIPT_PHP`. Both of these ids (`host_id` and `local_data_id`) can easily be bruteforced. The only requirement is that a `poller_item` with an `POLLER_ACTION_SCRIPT_PHP` action exists. This is very likely on a productive instance because this action is added by some predefined templates like `Device - Uptime` or `Device - Polling Time`. This command injection vulnerability allows an unauthenticated user to execute arbitrary commands if a `poller_item` with the `action` type `POLLER_ACTION_SCRIPT_PHP` (`2`) is configured. The authorization bypass should be prevented by not allowing an attacker to make `get_client_addr` (file `lib/functions.php`) return an arbitrary IP address. This could be done by not honoring the `HTTP_...` `$_SERVER` variables. If these should be kept for compatibility reasons it should at least be prevented to fake the IP address of the server running Cacti. This vulnerability has been addressed in both the 1.2.x and 1.3.x release branches with `1.2.23` being the first release containing the patch. | 2022-12-05 | 9.8 | CVE-2022-46169 MISC MISC MISC MISC |
casbin -- casdoor | Casdoor before v1.126.1 was discovered to contain an arbitrary file deletion vulnerability via the uploadFile function. | 2022-12-07 | 8.1 | CVE-2022-44942 MISC |
clastix -- capsule | Capsule is a multi-tenancy and policy-based framework for Kubernetes. Prior to version 0.1.3, a ServiceAccount deployed in a Tenant Namespace, when granted with `PATCH` capabilities on its own Namespace, is able to edit it and remove the Owner Reference, breaking the reconciliation of the Capsule Operator and removing all the enforcement like Pod Security annotations, Network Policies, Limit Range and Resource Quota items. An attacker could detach the Namespace from a Tenant that is forbidding starting privileged Pods using the Pod Security labels by removing the OwnerReference, removing the enforcement labels, and being able to start privileged containers that would be able to start a generic Kubernetes privilege escalation. Patches have been released for version 0.1.3. No known workarounds are available. | 2022-12-02 | 8.8 | CVE-2022-46167 MISC MISC MISC MISC |
clerk -- clerk.io | The Clerk WordPress plugin before 4.0.0 is affected by time-based attacks in the validation function for all API requests due to the usage of comparison operators to verify API keys against the ones stored in the site options. | 2022-12-05 | 7.5 | CVE-2022-3907 MISC |
concretecms -- concrete_cms | ConcreteCMS v9.1.3 was discovered to be vulnerable to Xpath injection attacks. This vulnerability allows attackers to access sensitive XML data via a crafted payload injected into the URL path folder "3". | 2022-12-05 | 7.5 | CVE-2022-46464 MISC |
craftcms -- craft_cms | All Craft CMS versions between 3.0.0 and 3.7.32 disclose password hashes of users who authenticate using their E-Mail address or username in Anti-CSRF-Tokens. Craft CMS uses a cookie called CRAFT_CSRF_TOKEN and a HTML hidden field called CRAFT_CSRF_TOKEN to avoid Cross Site Request Forgery attacks. The CRAFT_CSRF_TOKEN cookie discloses the password hash in without encoding it whereas the corresponding HTML hidden field discloses the users' password hash in a masked manner, which can be decoded by using public functions of the YII framework. | 2022-12-05 | 7.5 | CVE-2022-37783 MISC |
cybozu -- cybozu_remote_service | Uncontrolled resource consumption vulnerability in Cybozu Remote Service 4.0.0 to 4.0.3 allows a remote authenticated attacker to consume huge storage space, which may result in a denial-of-service (DoS) condition. | 2022-12-07 | 7.5 | CVE-2022-44608 MISC MISC |
d-link -- dhp-w310av_firmware | D-Link DHP-W310AV 3.10EU was discovered to contain a command injection vulnerability via the System Checks function. | 2022-12-02 | 9.8 | CVE-2022-44930 MISC |
d-link -- dvg-g5402sp_firmware | D-Link DVG-G5402SP GE_1.03 was discovered to contain a command injection vulnerability via the Maintenance function. | 2022-12-02 | 9.8 | CVE-2022-44928 MISC |
d-link -- dvg-g5402sp_firmware | An access control issue in D-Link DVG-G5402SP GE_1.03 allows unauthenticated attackers to escalate privileges via arbitrarily editing VoIP SIB profiles. | 2022-12-02 | 9.8 | CVE-2022-44929 MISC |
dottech -- smart_campus_system | A vulnerability, which was classified as problematic, has been found in Dot Tech Smart Campus System. Affected by this issue is some unknown functionality of the file /services/Card/findUser. The manipulation leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-214778 is the identifier assigned to this vulnerability. | 2022-12-03 | 7.5 | CVE-2022-4280 N/A N/A |
duxcms_project -- duxcms | A vulnerability was found in annyshow DuxCMS 2.1. It has been declared as problematic. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215116. | 2022-12-08 | 8 | CVE-2020-36610 MISC MISC |
elbtide -- advanced_booking_calendar | Unauth. SQL Injection (SQLi) vulnerability in Advanced Booking Calendar plugin <= 1.7.1 on WordPress. | 2022-12-05 | 9.8 | CVE-2022-45822 MISC |
f5 -- big-iq_centralized_management | In all versions, BIG-IP and BIG-IQ are vulnerable to cross-site request forgery (CSRF) attacks through iControl SOAP. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 2022-12-07 | 8.8 | CVE-2022-41622 MISC |
facepay_project -- facepay | A vulnerability has been found in Facepay 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /face-recognition-php/facepay-master/camera.php. The manipulation of the argument userId leads to authorization bypass. The attack can be launched remotely. The identifier VDB-214789 was assigned to this vulnerability. | 2022-12-05 | 8.8 | CVE-2022-4281 N/A |
force1rc -- discovery_wifi_u818a_hd\+_fpv_firmware | Buffer overflow in firmware lewei_cam binary version 2.0.10 in Force 1 Discovery Wifi U818A HD+ FPV Drone allows attacker to gain remote code execution as root user via a specially crafted UDP packet. Please update the Reference section to these links > http://thiscomputer.com/ > https://www.bostoncyber.org/ > https://medium.com/@meekworth/exploiting-the-lw9621-drone-camera-module-773f00081368 | 2022-12-06 | 9.8 | CVE-2022-40918 MISC MISC |
fortinet -- fortiadc | An improper neutralization of special elements used in an SQL Command ('SQL Injection') vulnerability in Fortinet FortiADC version 7.1.0, version 7.0.0 through 7.0.2 and version 6.2.4 and below allows an authenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests. | 2022-12-06 | 8.8 | CVE-2022-33875 MISC |
fortinet -- fortideceptor | An insufficient logging [CWE-778] vulnerability in FortiSandbox versions 4.0.0 to 4.0.2, 3.2.0 to 3.2.3 and 3.1.0 to 3.1.5 and FortiDeceptor versions 4.2.0, 4.1.0 through 4.1.1, 4.0.0 through 4.0.2, 3.3.0 through 3.3.3, 3.2.0 through 3.2.2,3.1.0 through 3.1.1 and 3.0.0 through 3.0.2 may allow a remote attacker to repeatedly enter incorrect credentials without causing a log entry, and with no limit on the number of failed authentication attempts. | 2022-12-06 | 7.5 | CVE-2022-30305 MISC |
fortinet -- fortiproxy | An authentication bypass by assumed-immutable data vulnerability [CWE-302] in the FortiOS SSH login component 7.2.0, 7.0.0 through 7.0.7, 6.4.0 through 6.4.9, 6.2 all versions, 6.0 all versions and FortiProxy SSH login component 7.0.0 through 7.0.5, 2.0.0 through 2.0.10, 1.2.0 all versions may allow a remote and unauthenticated attacker to login into the device via sending specially crafted Access-Challenge response from the Radius server. | 2022-12-06 | 9.8 | CVE-2022-35843 MISC |
franklinfueling -- colibri_firmware | Franklin Fueling System FFS Colibri 1.9.22.8925 is affected by: File system overwrite. The impact is: File system rewrite (remote). ¶¶ An attacker can overwrite system files like [system.conf] and [passwd], this occurs because the insecure usage of "fopen" system function with the mode "wb" which allows overwriting file if exists. Overwriting files such as passwd, allows an attacker to escalate his privileges by planting backdoor user with root privilege or change root password. | 2022-12-05 | 9.8 | CVE-2022-44039 MISC |
fsi -- fs040u_firmware | Cross-site request forgery (CSRF) vulnerability in +F FS040U software versions v2.3.4 and earlier, +F FS020W software versions v4.0.0 and earlier, +F FS030W software versions v3.3.5 and earlier, and +F FS040W software versions v1.4.1 and earlier allows an adjacent attacker to hijack the authentication of an administrator and user's unintended operations such as to reboot the product and/or reset the configuration to the initial set-up may be performed. | 2022-12-05 | 7.3 | CVE-2022-43470 MISC MISC MISC MISC MISC |
galaxyproject -- galaxy | Galaxy is an open-source platform for data analysis. An arbitrary file read exists in Galaxy 22.01 and Galaxy 22.05 due to the switch to Gunicorn, which can be used to read any file accessible to the operating system user under which Galaxy is running. This vulnerability affects Galaxy 22.01 and higher, after the switch to gunicorn, which serve static contents directly. Additionally, the vulnerability is mitigated when using Nginx or Apache to serve /static/* contents, instead of Galaxy's internal middleware. This issue has been patched in commit `e5e6bda4f` and will be included in future releases. Users are advised to manually patch their installations. There are no known workarounds for this vulnerability. | 2022-12-06 | 7.5 | CVE-2022-23470 MISC MISC |
ge -- cimplicity | GE CIMPICITY versions 2022 and prior is vulnerable when data from faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. | 2022-12-07 | 7.8 | CVE-2022-2002 MISC |
ge -- cimplicity | GE CIMPICITY versions 2022 and prior is vulnerable to a heap-based buffer overflow, which could allow an attacker to execute arbitrary code. | 2022-12-07 | 7.8 | CVE-2022-2948 MISC |
ge -- cimplicity | GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiOptionContainer, which could allow an attacker to execute arbitrary code. | 2022-12-07 | 7.8 | CVE-2022-2952 MISC |
ge -- cimplicity | GE CIMPICITY versions 2022 and prior is vulnerable when data from a faulting address controls code flow starting at gmmiObj!CGmmiRootOptionTable, which could allow an attacker to execute arbitrary code. | 2022-12-08 | 7.8 | CVE-2022-3084 MISC |
ge -- cimplicity | GE CIMPICITY versions 2022 and prior is vulnerable to an out-of-bounds write, which could allow an attacker to execute arbitrary code. | 2022-12-08 | 7.8 | CVE-2022-3092 MISC |
gitpython_project -- gitpython | All versions of package gitpython are vulnerable to Remote Code Execution (RCE) due to improper user input validation, which makes it possible to inject a maliciously crafted remote URL into the clone command. Exploiting this vulnerability is possible because the library makes external calls to git without sufficient sanitization of input arguments. | 2022-12-06 | 9.8 | CVE-2022-24439 CONFIRM CONFIRM |
goauthentik -- authentik | authentik is an open-source identity provider. Versions prior to 2022.11.2 and 2022.10.2 are vulnerable to unauthorized user creation and potential account takeover. With the default flows, unauthenticated users can create new accounts in authentik. If a flow exists that allows for email-verified password recovery, this can be used to overwrite the email address of admin accounts and take over their accounts. authentik 2022.11.2 and 2022.10.2 fix this issue. As a workaround, a policy can be created and bound to the `default-user-settings-flow flow` with the contents `return request.user.is_authenticated`. | 2022-12-02 | 9.8 | CVE-2022-46145 MISC MISC MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39090 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39091 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39092 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39093 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39094 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39095 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39096 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39097 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39098 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39099 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39100 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39101 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-39102 MISC |
google -- android | In UscAIEngine service, there is a missing permission check. This could lead to set up UscAIEngine service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-42776 MISC |
google -- android | In power management service, there is a missing permission check. This could lead to set up power management service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-42777 MISC |
google -- android | In windows manager service, there is a missing permission check. This could lead to set up windows manager service with no additional execution privileges needed. | 2022-12-06 | 7.8 | CVE-2022-42778 MISC |
google -- chrome | Type confusion in V8 in Google Chrome prior to 108.0.5359.94 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High) | 2022-12-02 | 8.8 | CVE-2022-4262 MISC MISC |
google -- tensorflow | TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have patched the issue in GitHub commit a65411a1d69edfb16b25907ffb8f73556ce36bb7. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.8.4, 2.9.3, and 2.10.1. | 2022-12-06 | 9.1 | CVE-2022-41902 MISC MISC CONFIRM |
google -- tensorflow | TensorFlow is an open source platform for machine learning. The function MakeGrapplerFunctionItem takes arguments that determine the sizes of inputs and outputs. If the inputs given are greater than or equal to the sizes of the outputs, an out-of-bounds memory read or a crash is triggered. We have patched the issue in GitHub commit a65411a1d69edfb16b25907ffb8f73556ce36bb7. The fix will be included in TensorFlow 2.11.0. We will also cherrypick this commit on TensorFlow 2.8.4, 2.9.3, and 2.10.1. | 2022-12-06 | 9.1 | CVE-2022-41910 MISC CONFIRM MISC |
gpac -- gpac | GPAC MP4box v2.0.0 was discovered to contain a stack overflow in the smil_parse_time_list parameter at /scenegraph/svg_attributes.c. | 2022-12-06 | 7.8 | CVE-2022-45283 MISC |
hasura -- graphql_engine | Hasura GraphQL Engine before 2.15.2 mishandles row-level authorization in the Update Many API for Postgres backends. The fixed versions are 2.10.2, 2.11.3, 2.12.1, 2.13.2, 2.14.1, and 2.15.2. (Versions before 2.10.0 are unaffected.) | 2022-12-08 | 8.8 | CVE-2022-46792 MISC MISC MISC |
haxx -- curl | When doing HTTP(S) transfers, libcurl might erroneously use the read callback (`CURLOPT_READFUNCTION`) to ask for data to send, even when the `CURLOPT_POSTFIELDS` option has been set, if the same handle previously was used to issue a `PUT` request which used that callback. This flaw may surprise the application and cause it to misbehave and either send off the wrong data or use memory after free or similar in the subsequent `POST` request. The problem exists in the logic for a reused handle when it is changed from a PUT to a POST. | 2022-12-05 | 9.8 | CVE-2022-32221 MISC |
hope-boot_project -- hope-boot | hope-boot 1.0.0 has a deserialization vulnerability that can cause Remote Code Execution (RCE). | 2022-12-07 | 9.8 | CVE-2022-44371 MISC |
hornerautomation -- rcc972_firmware | Horner Automation’s RCC 972 with firmware version 15.40 has a static encryption key on the device. This could allow an attacker to perform unauthorized changes to the device, remotely execute arbitrary code, or cause a denial-of-service condition. | 2022-12-02 | 9.8 | CVE-2022-2641 MISC |
hornerautomation -- rcc972_firmware | The Config-files of Horner Automation’s RCC 972 with firmware version 15.40 are encrypted with weak XOR encryption vulnerable to reverse engineering. This could allow an attacker to obtain credentials to run services such as File Transfer Protocol (FTP) and Hypertext Transfer Protocol (HTTP). | 2022-12-02 | 7.5 | CVE-2022-2640 MISC |
hornerautomation -- rcc972_firmware | Horner Automation’s RCC 972 firmware version 15.40 contains global variables. This could allow an attacker to read out sensitive values and variable keys from the device. | 2022-12-02 | 7.5 | CVE-2022-2642 MISC |
house_rental_system_project -- house_rental_system | A vulnerability, which was classified as critical, was found in House Rental System. Affected is an unknown function of the file /view-property.php. The manipulation of the argument property_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-214770 is the identifier assigned to this vulnerability. | 2022-12-03 | 9.8 | CVE-2022-4274 N/A N/A |
house_rental_system_project -- house_rental_system | A vulnerability has been found in House Rental System and classified as critical. Affected by this vulnerability is an unknown functionality of the file search-property.php of the component POST Request Handler. The manipulation of the argument search_property leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214771. | 2022-12-03 | 9.8 | CVE-2022-4275 N/A N/A |
house_rental_system_project -- house_rental_system | A vulnerability was found in House Rental System and classified as critical. Affected by this issue is some unknown functionality of the file tenant-engine.php of the component POST Request Handler. The manipulation of the argument id_photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214772. | 2022-12-03 | 9.8 | CVE-2022-4276 N/A N/A |
human_resource_management_system_project -- human_resource_management_system | A vulnerability, which was classified as critical, has been found in SourceCodester Human Resource Management System 1.0. This issue affects some unknown processing of the file /hrm/controller/employee.php of the component Content-Type Handler. The manipulation of the argument pfimg leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214769 was assigned to this vulnerability. | 2022-12-03 | 9.8 | CVE-2022-4273 MISC MISC |
human_resource_management_system_project -- human_resource_management_system | A vulnerability was found in SourceCodester Human Resource Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /hrm/employeeadd.php. The manipulation of the argument empid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-214775. | 2022-12-03 | 7.2 | CVE-2022-4278 N/A N/A |
ibm -- content_navigator | IBM Content Navigator 3.0.0, 3.0.1, 3.0.2, 3.0.3, 3.0.4, 3.0.5, 3.0.6, 3.0.7, 3.0.8, 3.0.9, 3.0.10, 3.0.11, and 3.0.12 is vulnerable to missing authorization and could allow an authenticated user to load external plugins and execute code. IBM X-Force ID: 238805. | 2022-12-07 | 8.8 | CVE-2022-43581 MISC MISC |
ibm -- spectrum_scale_container_native_storage_access | IBM Spectrum Scale 5.1.0.1 through 5.1.4.1 could allow a local attacker to execute arbitrary commands in the container. IBM X-Force ID: 239437. | 2022-12-06 | 7.8 | CVE-2022-43867 MISC MISC |
ibm -- sterling_secure_proxy | IBM Sterling Secure Proxy 6.0.3 uses weaker than expected cryptographic algorithms that could allow an attacker to decrypt highly sensitive information. IBM X-Force ID: 230522. | 2022-12-06 | 7.5 | CVE-2022-34361 MISC MISC |
ilias -- ilias | ILIAS before 7.16 allows OS Command Injection. | 2022-12-07 | 8.8 | CVE-2022-45915 MISC FULLDISC MISC |
inksplat -- comic_book_management_system | The Comic Book Management System WordPress plugin before 2.2.0 does not sanitize and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as Admin. | 2022-12-05 | 7.2 | CVE-2022-3856 MISC MISC |
ivanti -- endpoint_manager | A privilege escalation vulnerability is identified in Ivanti EPM (LANDesk Management Suite) that allows a user to execute commands with elevated privileges. | 2022-12-05 | 9.8 | CVE-2022-27773 MISC |
ivanti -- endpoint_manager | XML Injection with Endpoint Manager 2022. 3 and below causing a download of a malicious file to run and possibly execute to gain unauthorized privileges. | 2022-12-05 | 7.8 | CVE-2022-35259 MISC |
joinmastodon -- mastodon | Mastodon through 4.0.2 allows attackers to cause a denial of service (large Sidekiq pull queue) by creating bot accounts that follow attacker-controlled accounts on certain other servers associated with a wildcard DNS A record, such that there is uncontrolled recursion of attacker-generated messages. | 2022-12-04 | 7.5 | CVE-2022-46405 MISC MISC |
jrecms -- springbootcms | A vulnerability was found in SpringBootCMS and classified as critical. Affected by this issue is some unknown functionality of the component Template Management. The manipulation leads to injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-214790 is the identifier assigned to this vulnerability. | 2022-12-05 | 7.2 | CVE-2022-4282 MISC MISC |
kodcloud -- kodexplorer | Kodexplorer is a chinese language web based file manager and browser based code editor. Versions prior to 4.50 did not prevent unauthenticated users from requesting arbitrary files from the host OS file system. As a result any files available to the host process may be accessed by arbitrary users. This issue has been addressed in version 4.50. Users are advised to upgrade. There are no known workarounds for this issue. | 2022-12-06 | 7.5 | CVE-2022-46154 MISC MISC |
kujirahand -- nadesiko3 | OS command injection vulnerability in Nadesiko3 (PC Version) v3.3.61 and earlier allows a remote attacker to execute an arbitrary OS command when processing compression and decompression on the product. | 2022-12-05 | 9.8 | CVE-2022-41642 MISC MISC MISC |
lazy_mouse_project -- lazy_mouse | Lazy Mouse server enforces weak password requirements and doesn't implement rate limiting, allowing remote unauthenticated users to easily and quickly brute force the PIN and execute arbitrary commands. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 2022-12-02 | 9.8 | CVE-2022-45482 MISC |
lzmouse -- lazy_mouse | The default configuration of Lazy Mouse does not require a password, allowing remote unauthenticated users to execute arbitrary code with no prior authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 2022-12-05 | 9.8 | CVE-2022-45481 MISC |
maku -- maku-boot | A vulnerability, which was classified as critical, was found in maku-boot up to 2.2.0. This affects the function doExecute of the file AbstractScheduleJob.java of the component Scheduled Task Handler. The manipulation leads to injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 446eb7294332efca2bfd791bc37281cedac0d0ff. It is recommended to apply a patch to fix this issue. The identifier VDB-215013 was assigned to this vulnerability. | 2022-12-07 | 7.2 | CVE-2022-4322 N/A N/A N/A |
markdown_preview_enhanced_project -- markdown_preview_enhanced | Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom was discovered to contain a command injection vulnerability via the PDF file import function. | 2022-12-07 | 9.8 | CVE-2022-45025 MISC |
markdown_preview_enhanced_project -- markdown_preview_enhanced | An issue in Markdown Preview Enhanced v0.6.5 and v0.19.6 for VSCode and Atom allows attackers to execute arbitrary commands during the GFM export process. | 2022-12-07 | 9.8 | CVE-2022-45026 MISC |
mikrotik -- routeros | Mikrotik RouterOs before stable v7.5 was discovered to contain an out-of-bounds read in the hotspot process. This vulnerability allows attackers to execute arbitrary code via a crafted nova message. | 2022-12-05 | 9.8 | CVE-2022-45313 MISC |
mikrotik -- routeros | Mikrotik RouterOs before stable v7.6 was discovered to contain an out-of-bounds read in the snmp process. This vulnerability allows attackers to execute arbitrary code via a crafted packet. | 2022-12-05 | 9.8 | CVE-2022-45315 MISC |
mobatek -- mobaxterm | When aborting a SFTP connection, MobaXterm before v22.1 sends a hardcoded password to the server. The server treats this as an invalid login attempt which can result in a Denial of Service (DoS) for the user if services like fail2ban are used. | 2022-12-06 | 9.1 | CVE-2022-38337 MISC MISC |
mobatek -- mobaxterm | An access control issue in MobaXterm before v22.1 allows attackers to make connections to the server via the SSH or SFTP protocols without authentication. | 2022-12-06 | 8.1 | CVE-2022-38336 MISC |
moxa -- uc-8580-t-lx_firmware | Cradlepoint IBR600 NCOS versions 6.5.0.160bc2e and prior are vulnerable to shell escape, which enables local attackers with non-superuser credentials to gain full, unrestrictive shell access which may allow an attacker to execute arbitrary code. | 2022-12-02 | 7.6 | CVE-2022-3086 MISC |
nadesiko3_project -- nadesiko3 | OS command injection vulnerability in Nako3edit, editor component of nadesiko3 (PC Version) v3.3.74 and earlier allows a remote attacker to obtain appkey of the product and execute an arbitrary OS command on the product. | 2022-12-05 | 9.8 | CVE-2022-42496 MISC MISC MISC |
nadesiko3_project -- nadesiko3 | Improper check or handling of exceptional conditions vulnerability in Nako3edit, editor component of nadesiko3 (PC Version) v3.3.74 and earlier allows a remote attacker to inject an invalid value to decodeURIComponent of nako3edit, which may lead the server to crash. | 2022-12-05 | 7.5 | CVE-2022-41777 MISC MISC MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in xrdp_login_wnd_create() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.8 | CVE-2022-23468 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in audin_send_open() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.8 | CVE-2022-23477 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Write in xrdp_mm_trans_process_drdynvc_channel_open() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.8 | CVE-2022-23478 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in xrdp_mm_chan_data_in() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.8 | CVE-2022-23479 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a buffer over flow in devredir_proc_client_devlist_announce_req() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.8 | CVE-2022-23480 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Integer Overflow in xrdp_mm_process_rail_update_window_text() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.8 | CVE-2022-23484 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_caps_process_confirm_active() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.1 | CVE-2022-23481 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_sec_process_mcs_data_CS_CORE() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.1 | CVE-2022-23482 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in libxrdp_send_to_channel() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.1 | CVE-2022-23483 MISC |
neutrinolabs -- xrdp | xrdp is an open source project which provides a graphical login to remote machines using Microsoft Remote Desktop Protocol (RDP). xrdp < v0.9.21 contain a Out of Bound Read in xrdp_mm_trans_process_drdynvc_channel_close() function. There are no known workarounds for this issue. Users are advised to upgrade. | 2022-12-09 | 9.1 | CVE-2022-23493 MISC |
nodebb -- nodebb | NodeBB is an open source Node.js based forum software. Due to a plain object with a prototype being used in socket.io message handling a specially crafted payload can be used to impersonate other users and takeover accounts. This vulnerability has been patched in version 2.6.1. Users are advised to upgrade. Users unable to upgrade may cherry-pick commit `48d143921753914da45926cca6370a92ed0c46b8` into their codebase to patch the exploit. | 2022-12-05 | 9.8 | CVE-2022-46164 MISC MISC |
nodejs -- node.js | The llhttp parser in the http module in Node v18.7.0 does not correctly handle header fields that are not terminated with CLRF. This may result in HTTP Request Smuggling. | 2022-12-05 | 9.8 | CVE-2022-35256 MISC |
nodejs -- node.js | A weak randomness in WebCrypto keygen vulnerability exists in Node.js 18 due to a change with EntropySource() in SecretKeyGenTraits::DoKeyGen() in src/crypto/crypto_keygen.cc. There are two problems with this: 1) It does not check the return value, it assumes EntropySource() always succeeds, but it can (and sometimes will) fail. 2) The random data returned byEntropySource() may not be cryptographically strong and therefore not suitable as keying material. | 2022-12-05 | 9.1 | CVE-2022-35255 MISC |
nodejs -- node.js | A OS Command Injection vulnerability exists in Node.js versions <14.21.1, <16.18.1, <18.12.1, <19.0.1 due to an insufficient IsAllowedHost check that can easily be bypassed because IsIPAddress does not properly check if an IP address is invalid before making DBS requests allowing rebinding attacks.The fix for this issue in https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32212 was incomplete and this new CVE is to complete the fix. | 2022-12-05 | 8.1 | CVE-2022-43548 MISC |
nokogiri -- nokogiri | Nokogiri is an open source XML and HTML library for the Ruby programming language. Nokogiri `1.13.8` and `1.13.9` fail to check the return value from `xmlTextReaderExpand` in the method `Nokogiri::XML::Reader#attribute_hash`. This can lead to a null pointer exception when invalid markup is being parsed. For applications using `XML::Reader` to parse untrusted inputs, this may potentially be a vector for a denial of service attack. Users are advised to upgrade to Nokogiri `>= 1.13.10`. Users may be able to search their code for calls to either `XML::Reader#attributes` or `XML::Reader#attribute_hash` to determine if they are affected. | 2022-12-08 | 7.5 | CVE-2022-23476 MISC MISC MISC |
nttdata -- terasoluna_server_framework_for_java_\(rich\) | TERASOLUNA Global Framework 1.0.0 (Public review version) and TERASOLUNA Server Framework for Java (Rich) 2.0.0.2 to 2.0.5.1 are vulnerable to a ClassLoader manipulation vulnerability due to using the old version of Spring Framework which contains the vulnerability.The vulnerability is caused by an improper input validation issue in the binding mechanism of Spring MVC. By the application processing a specially crafted file, arbitrary code may be executed with the privileges of the application. | 2022-12-05 | 7.8 | CVE-2022-43484 MISC MISC MISC |
offis -- dcmtk | DCMTK v3.6.7 was discovered to contain a memory leak via the T_ASC_Association object. | 2022-12-02 | 7.5 | CVE-2022-43272 MISC MISC |
omron -- cx-programmer | Use-after free vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. | 2022-12-07 | 7.8 | CVE-2022-43508 MISC MISC |
omron -- cx-programmer | Out-of-bounds write vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. | 2022-12-07 | 7.8 | CVE-2022-43509 MISC MISC |
omron -- cx-programmer | Stack-based buffer overflow vulnerability exists in CX-Programmer v.9.77 and earlier, which may lead to information disclosure and/or arbitrary code execution by having a user to open a specially crafted CXP file. | 2022-12-07 | 7.8 | CVE-2022-43667 MISC MISC |
online_leave_management_system_project -- online_leave_management_system | Online Leave Management System v1.0 was discovered to contain an arbitrary file upload vulnerability at /leave_system/classes/SystemSettings.php?f=update_settings. This vulnerability allows attackers to execute arbitrary code via a crafted PHP file. | 2022-12-07 | 7.2 | CVE-2022-45009 MISC |
paddlepaddle -- paddlepaddle | Code injection in paddle.audio.functional.get_window in PaddlePaddle 2.4.0-rc0 allows arbitrary code execution. | 2022-12-07 | 9.8 | CVE-2022-46742 MISC |
paddlepaddle -- paddlepaddle | Out-of-bounds read in gather_tree in PaddlePaddle before 2.4. | 2022-12-07 | 9.1 | CVE-2022-46741 MISC |
passeo_project -- passeo | Passeo is an open source python password generator. Versions prior to 1.0.5 rely on the python `random` library for random value selection. The python `random` library warns that it should not be used for security purposes due to its reliance on a non-cryptographically secure random number generator. As a result a motivated attacker may be able to guess generated passwords. This issue has been addressed in version 1.0.5. Users are advised to upgrade. There are no known workarounds for this vulnerability. | 2022-12-06 | 7.5 | CVE-2022-23472 MISC MISC MISC |
pdfmake_project -- pdfmake | pdfmake is an open source client/server side PDF printing in pure JavaScript. In versions up to and including 0.2.5 pdfmake contains an unsafe evaluation of user controlled input. Users of pdfmake are thus subject to arbitrary code execution in the context of the process running the pdfmake code. There are no known fixes for this issue. Users are advised to restrict access to trusted user input. | 2022-12-06 | 9.8 | CVE-2022-46161 MISC MISC |
postmagthemes -- postmagthemes_demo_import | The PostmagThemes Demo Import WordPress plugin through 1.0.7 does not validate the imported file, allowing high-privilege users such as admin to upload arbitrary files (such as PHP) leading to RCE. | 2022-12-05 | 7.2 | CVE-2022-1540 MISC |
premio -- chaty | The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line, WeChat, Email, SMS, Call Button WordPress plugin before 3.0.3 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by users with a role as low as admin. | 2022-12-05 | 7.2 | CVE-2022-3858 MISC |
proofpoint -- enterprise_protection | The Admin Smart Search feature in Proofpoint Enterprise Protection (PPS/PoD) contains a stored cross-site scripting vulnerability that enables an anonymous email sender to gain admin privileges within the user interface. This affects all versions 8.19.0 and below. | 2022-12-06 | 9.6 | CVE-2022-46332 MISC |
proofpoint -- enterprise_protection | The admin user interface in Proofpoint Enterprise Protection (PPS/PoD) contains a command injection vulnerability that enables an admin to execute commands beyond their allowed scope. This affects all versions 8.19.0 and below. | 2022-12-06 | 7.2 | CVE-2022-46333 MISC |
protocol -- libp2p | libp2p-rust is the official rust language Implementation of the libp2p networking stack. In versions prior to 0.45.1 an attacker node can cause a victim node to allocate a large number of small memory chunks, which can ultimately lead to the victim’s process running out of memory and thus getting killed by its operating system. When executed continuously, this can lead to a denial of service attack, especially relevant on a larger scale when run against more than one node of a libp2p based network. Users are advised to upgrade to `libp2p` `v0.45.1` or above. Users unable to upgrade should reference the DoS Mitigation page for more information on how to incorporate mitigation strategies, monitor their application, and respond to attacks: https://docs.libp2p.io/reference/dos-mitigation/. | 2022-12-07 | 7.5 | CVE-2022-23486 MISC |
protocol -- libp2p | js-libp2p is the official javascript Implementation of libp2p networking stack. Versions older than `v0.38.0` of js-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of js-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to update their js-libp2p dependency to `v0.38.0` or greater. There are no known workarounds for this vulnerability. | 2022-12-07 | 7.5 | CVE-2022-23487 MISC |
protocol -- libp2p | go-libp2p is the offical libp2p implementation in the Go programming language. Version `0.18.0` and older of go-libp2p are vulnerable to targeted resource exhaustion attacks. These attacks target libp2p’s connection, stream, peer, and memory management. An attacker can cause the allocation of large amounts of memory, ultimately leading to the process getting killed by the host’s operating system. While a connection manager tasked with keeping the number of connections within manageable limits has been part of go-libp2p, this component was designed to handle the regular churn of peers, not a targeted resource exhaustion attack. Users are advised to upgrade their version of go-libp2p to version `0.18.1` or newer. Users unable to upgrade may consult the denial of service (dos) mitigation page for more information on how to incorporate mitigation strategies, monitor your application, and respond to attacks. | 2022-12-08 | 7.5 | CVE-2022-23492 MISC MISC MISC |
proxmox -- proxmox_mail_gateway | Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) are vulnerable to SSRF when proxying HTTP requests between pve(pmg)proxy and pve(pmg)daemon. An attacker with an unprivileged account can craft an HTTP request to achieve SSRF and file disclosure of any files on the server. Also, in Proxmox Mail Gateway, privilege escalation to the root@pam account is possible if the backup feature has ever been used, because backup files such as pmg-backup_YYYY_MM_DD_*.tgz have 0644 permissions and contain an authkey value. This is fixed in pve-http-server 4.1-3. | 2022-12-04 | 9.8 | CVE-2022-35508 MISC MISC MISC MISC |
proxmox -- proxmox_mail_gateway | A response-header CRLF injection vulnerability in the Proxmox Virtual Environment (PVE) and Proxmox Mail Gateway (PMG) web interface allows a remote attacker to set cookies for a victim's browser that are longer than the server expects, causing a client-side DoS. This affects Chromium-based browsers because they allow injection of response headers with %0d. This is fixed in pve-http-server 4.1-3. | 2022-12-04 | 7.1 | CVE-2022-35507 MISC MISC |
pulsesecure -- pulse_connect_secure | An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1. | 2022-12-05 | 7.5 | CVE-2022-35254 MISC |
pulsesecure -- pulse_connect_secure | An unauthenticated attacker can cause a denial-of-service to the following products: Ivanti Connect Secure (ICS) in versions prior to 9.1R14.3, 9.1R15.2, 9.1R16.2, and 22.2R4, Ivanti Policy Secure (IPS) in versions prior to 9.1R17 and 22.3R1, and Ivanti Neurons for Zero-Trust Access in versions prior to 22.3R1. | 2022-12-05 | 7.5 | CVE-2022-35258 MISC |
pwndoc_project -- pwndoc | An issue in the /api/audits component of Pwndoc v0.5.3 allows attackers to escalate privileges and execute arbitrary code via uploading a crafted audit file. | 2022-12-05 | 8.8 | CVE-2022-45771 MISC MISC |
py7zr_project -- py7zr | A directory traversal vulnerability in the SevenZipFile.extractall() function of the python library py7zr v0.20.0 and earlier allows attackers to write arbitrary files via extracting a crafted 7z file. | 2022-12-06 | 9.1 | CVE-2022-44900 MISC MISC MISC |
quarkus -- quarkus | Quarkus CORS filter allows simple GET and POST requests with invalid Origin to proceed. Simple GET or POST requests made with XMLHttpRequest are the ones which have no event listeners registered on the object returned by the XMLHttpRequest upload property and have no ReadableStream object used in the request. | 2022-12-06 | 9.8 | CVE-2022-4147 MISC |
rack_project -- rack | A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack. | 2022-12-05 | 10 | CVE-2022-30123 MISC |
rack_project -- rack | A possible denial of service vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 in the multipart parsing component of Rack. | 2022-12-05 | 7.5 | CVE-2022-30122 MISC |
rackn -- digital_rebar | RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has exposed a privileged token via a public API endpoint (Incorrect Access Control). The token can be used to escalate privileges within the Digital Rebar system and grant full administrative access. | 2022-12-06 | 9.8 | CVE-2022-46383 MISC MISC |
rackn -- digital_rebar | RackN Digital Rebar through 4.6.14, 4.7 through 4.7.22, 4.8 through 4.8.5, 4.9 through 4.9.12, and 4.10 through 4.10.8 has Insecure Permissions. After signing into Digital Rebar, users are issued authentication tokens tied to their account to perform actions within Digital Rebar. During the validation process of these tokens, Digital Rebar did not check if the user account still exists. Deleted Digital Rebar users could still use their tokens to perform actions within Digital Rebar. | 2022-12-06 | 8.8 | CVE-2022-46382 MISC |
redmine -- redmine | Redmine 5.x before 5.0.4 allows downloading of file attachments of any Issue or any Wiki page due to insufficient permission checks. Depending on the configuration, this may require login as a registered user. | 2022-12-06 | 7.5 | CVE-2022-44030 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a SQL injection vulnerability via the heading_field_id parameter. | 2022-12-02 | 9.8 | CVE-2022-44945 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a DOM-based cross-site scripting (XSS) vulnerability in the component /rukovoditel/index.php?module=users/login. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted GET request. | 2022-12-05 | 8.8 | CVE-2022-45020 MISC |
samsung -- exynos_firmware | Improper authorization in Exynos baseband prior to SMR DEC-2022 Release 1 allows remote attacker to get sensitive information including IMEI via emergency call. | 2022-12-08 | 7.5 | CVE-2022-39902 MISC |
sangoma -- asterisk | In Sangoma Asterisk through 16.28.0, 17.x and 18.x through 18.14.0, and 19.x through 19.6.0, an incoming Setup message to addons/ooh323c/src/ooq931.c with a malformed Calling or Called Party IE can cause a crash. | 2022-12-05 | 7.5 | CVE-2022-37325 MISC |
sanitization_management_system_project -- sanitization_management_system | Sanitization Management System v1.0 is vulnerable to SQL Injection via /php-sms/admin/?page=services/view_service&id=. | 2022-12-07 | 7.2 | CVE-2022-44393 MISC |
seagate -- stcg2000300_firmware | The web-management application on Seagate Central NAS STCG2000300, STCG3000300, and STCG4000300 devices allows OS command injection via mv_backend_launch in cirrus/application/helpers/mv_backend_helper.php by leveraging the "start" state and sending a check_device_name request. | 2022-12-06 | 9.8 | CVE-2020-6627 MISC MISC MISC |
secomea -- gatemanager | Improper Input Validation of plugin files in Administrator Interface of Secomea GateManager allows a server administrator to inject code into the GateManager interface. This issue affects: Secomea GateManager versions prior to 10.0. | 2022-12-06 | 7.2 | CVE-2022-38123 MISC |
simple-git_project -- simple-git | The package simple-git before 3.15.0 are vulnerable to Remote Code Execution (RCE) when enabling the ext transport protocol, which makes it exploitable via clone() method. This vulnerability exists due to an incomplete fix of [CVE-2022-24066](https://security.snyk.io/vuln/SNYK-JS-SIMPLEGIT-2434306). | 2022-12-06 | 9.8 | CVE-2022-25912 CONFIRM CONFIRM CONFIRM CONFIRM CONFIRM |
simple_phone_book\/directory_web_app_project -- simple_phone_book\/directory_web_app | Simple Phone Book/Directory Web App v1.0 was discovered to contain a SQL injection vulnerability via the editid parameter at /PhoneBook/edit.php. | 2022-12-07 | 9.8 | CVE-2022-45010 MISC |
skycaiji -- skycaiji | Skycaiji v2.5.1 was discovered to contain a deserialization vulnerability via /SkycaijiApp/admin/controller/Mystore.php. | 2022-12-07 | 9.8 | CVE-2022-44351 MISC |
slims -- senayan_library_management_system | SLiMS 9 Bulian v9.5.0 was discovered to contain a SQL injection vulnerability via the keywords parameter. | 2022-12-05 | 7.5 | CVE-2022-45019 MISC |
stackstorm -- stackstorm | Improper access control in Key-Value RBAC in StackStorm version 3.7.0 didn't check the permissions in Jinja filters, allowing attackers to access K/V pairs of other users, potentially leading to the exposure of sensitive Information. | 2022-12-06 | 7.5 | CVE-2022-44009 MISC |
swiftterm_project -- swiftterm | SwiftTerm is a Xterm/VT100 Terminal emulator. Prior to commit a94e6b24d24ce9680ad79884992e1dff8e150a31, an attacker could modify the window title via a certain character escape sequence and then insert it back to the command line in the user's terminal, e.g. when the user views a file containing the malicious sequence, which could allow the attacker to execute arbitrary commands. Version a94e6b24d24ce9680ad79884992e1dff8e150a31 contains a patch for this issue. There are no known workarounds available. | 2022-12-02 | 7.8 | CVE-2022-23465 MISC MISC |
syncee -- syncee_-_global_dropshipping | The Syncee WordPress plugin before 1.0.10 leaks the administrator token that can be used to take over the administrator's account. | 2022-12-05 | 7.5 | CVE-2022-3694 MISC |
telepad-app -- telepad | Telepad allows remote unauthenticated users to send instructions to the server to execute arbitrary code without any previous authorization or authentication. CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H | 2022-12-05 | 9.8 | CVE-2022-45477 MISC |
telos -- omnia_mpx_node_firmware | Insecure permissions in Telos Alliance Omnia MPX Node v1.0.0 to v1.4.9 allow attackers to manipulate and access system settings with backdoor account low privilege, this can lead to change hardware settings and execute arbitrary commands in vulnerable system functions that is requires high privilege to access. | 2022-12-02 | 8.8 | CVE-2022-45562 MISC |
telosalliance -- omnia_mpx_node_firmware | An unauthenticated command injection vulnerability in the product license validation function of Telos Alliance Omnia MPX Node 1.3.* - 1.4.* allows attackers to execute arbitrary commands via a crafted payload injected into the license input. | 2022-12-02 | 9.8 | CVE-2022-43325 MISC |
tenda -- a18_firmware | Tenda A18 v15.13.07.09 was discovered to contain a stack overflow via the security_5g parameter at /goform/WifiBasicSet. | 2022-12-08 | 7.5 | CVE-2022-44931 MISC |
tenda -- a18_firmware | An access control issue in Tenda A18 v15.13.07.09 allows unauthenticated attackers to access the Telnet service. | 2022-12-08 | 7.5 | CVE-2022-44932 MISC |
tenda -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 is vulnerable to Buffer Overflow via formSetMacFilterCfg. | 2022-12-02 | 7.5 | CVE-2022-45641 MISC |
tenda -- i21_firmware | Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/AddSysLogRule. | 2022-12-02 | 9.8 | CVE-2022-44362 MISC |
tenda -- i21_firmware | Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setSnmpInfo. | 2022-12-02 | 9.8 | CVE-2022-44363 MISC |
tenda -- i21_firmware | Tenda i21 V1.0.0.14(4656) has a stack overflow vulnerability via /goform/setSysPwd. | 2022-12-02 | 9.8 | CVE-2022-44365 MISC |
tenda -- i21_firmware | Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setDiagnoseInfo. | 2022-12-02 | 9.8 | CVE-2022-44366 MISC |
tenda -- i21_firmware | Tenda i21 V1.0.0.14(4656) is vulnerable to Buffer Overflow via /goform/setUplinkInfo. | 2022-12-02 | 9.8 | CVE-2022-44367 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterSet function. | 2022-12-02 | 7.5 | CVE-2022-45663 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the list parameter in the formwrlSSIDget function. | 2022-12-02 | 7.5 | CVE-2022-45664 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the index parameter in the formWifiMacFilterGet function. | 2022-12-02 | 7.5 | CVE-2022-45669 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the ping1 parameter in the formSetAutoPing function. | 2022-12-02 | 7.5 | CVE-2022-45670 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the appData parameter in the formSetAppFilterRule function. | 2022-12-02 | 7.5 | CVE-2022-45671 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) was discovered to contain a buffer overflow via the formWx3AuthorizeSet function. | 2022-12-02 | 7.5 | CVE-2022-45672 MISC |
tenda -- w30e_firmware | Tenda W30E v1.0.1.25(633) was discovered to contain a command injection vulnerability via the fileNameMit parameter at /goform/delFileName. | 2022-12-08 | 9.8 | CVE-2022-45506 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the cmdinput parameter at /goform/exeCommand. | 2022-12-08 | 7.5 | CVE-2022-45505 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the editNameMit parameter at /goform/editFileName. | 2022-12-08 | 7.5 | CVE-2022-45507 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the new_account parameter at /goform/editUserName. | 2022-12-08 | 7.5 | CVE-2022-45508 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the account parameter at /goform/addUserName. | 2022-12-08 | 7.5 | CVE-2022-45509 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the mit_ssid_index parameter at /goform/AdvSetWrlsafeset. | 2022-12-08 | 7.5 | CVE-2022-45510 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the PPPOEPassword parameter at /goform/QuickIndex. | 2022-12-08 | 7.5 | CVE-2022-45511 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeEmailFilter. | 2022-12-08 | 7.5 | CVE-2022-45512 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/P2pListFilter. | 2022-12-08 | 7.5 | CVE-2022-45513 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/webExcptypemanFilter. | 2022-12-08 | 7.5 | CVE-2022-45514 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the entries parameter at /goform/addressNat. | 2022-12-08 | 7.5 | CVE-2022-45515 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/NatStaticSetting. | 2022-12-08 | 7.5 | CVE-2022-45516 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/VirtualSer. | 2022-12-08 | 7.5 | CVE-2022-45517 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SetIpBind. | 2022-12-08 | 7.5 | CVE-2022-45518 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the Go parameter at /goform/SafeMacFilter. | 2022-12-08 | 7.5 | CVE-2022-45519 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/qossetting. | 2022-12-08 | 7.5 | CVE-2022-45520 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeUrlFilter. | 2022-12-08 | 7.5 | CVE-2022-45521 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/SafeClientFilter. | 2022-12-08 | 7.5 | CVE-2022-45522 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the page parameter at /goform/L7Im. | 2022-12-08 | 7.5 | CVE-2022-45523 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the opttype parameter at /goform/IPSECsave. | 2022-12-08 | 7.5 | CVE-2022-45524 MISC |
tenda -- w30e_firmware | Tenda W30E V1.0.1.25(633) was discovered to contain a stack overflow via the downaction parameter at /goform/CertListInfo. | 2022-12-08 | 7.5 | CVE-2022-45525 MISC |
tenda -- w6-s_firmware | Tenda W6-S v1.0.0.4(510) was discovered to contain a command injection vulnerability in the tpi_get_ping_output function at /goform/exeCommand. | 2022-12-08 | 9.8 | CVE-2022-45497 MISC |
tenda -- w6-s_firmware | An issue in the component tpi_systool_handle(0) (/goform/SysToolReboot) of Tenda W6-S v1.0.0.4(510) allows unauthenticated attackers to arbitrarily reboot the device. | 2022-12-08 | 7.5 | CVE-2022-45498 MISC |
tenda -- w6-s_firmware | Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/WifiMacFilterGet. | 2022-12-08 | 7.5 | CVE-2022-45499 MISC |
tenda -- w6-s_firmware | Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the wl_radio parameter at /goform/wifiSSIDset. | 2022-12-08 | 7.5 | CVE-2022-45501 MISC |
tenda -- w6-s_firmware | Tenda W6-S v1.0.0.4(510) was discovered to contain a stack overflow via the linkEn parameter at /goform/setAutoPing. | 2022-12-08 | 7.5 | CVE-2022-45503 MISC |
tenda -- w6-s_firmware | An issue in the component tpi_systool_handle(0) (/goform/SysToolRestoreSet) of Tenda W6-S v1.0.0.4(510) allows unauthenticated attackers to arbitrarily reboot the device. | 2022-12-08 | 7.5 | CVE-2022-45504 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the addWifiMacFilter function. | 2022-12-02 | 7.5 | CVE-2022-45643 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceId parameter in the formSetClientState function. | 2022-12-02 | 7.5 | CVE-2022-45644 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the deviceMac parameter in the addWifiMacFilter function. | 2022-12-02 | 7.5 | CVE-2022-45645 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeedUp parameter in the formSetClientState function. | 2022-12-02 | 7.5 | CVE-2022-45646 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the limitSpeed parameter in the formSetClientState function. | 2022-12-02 | 7.5 | CVE-2022-45647 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the devName parameter in the formSetDeviceName function. | 2022-12-02 | 7.5 | CVE-2022-45648 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the endIp parameter in the formSetPPTPServer function. | 2022-12-02 | 7.5 | CVE-2022-45649 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the firewallEn parameter in the formSetFirewallCfg function. | 2022-12-02 | 7.5 | CVE-2022-45650 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the list parameter in the formSetVirtualSer function. | 2022-12-02 | 7.5 | CVE-2022-45651 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the startIp parameter in the formSetPPTPServer function. | 2022-12-02 | 7.5 | CVE-2022-45652 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the page parameter in the fromNatStaticSetting function. | 2022-12-02 | 7.5 | CVE-2022-45653 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the ssid parameter in the form_fast_setting_wifi_set function. | 2022-12-02 | 7.5 | CVE-2022-45654 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the timeZone parameter in the form_fast_setting_wifi_set function. | 2022-12-02 | 7.5 | CVE-2022-45655 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the time parameter in the fromSetSysTime function. | 2022-12-02 | 7.5 | CVE-2022-45656 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the list parameter in the fromSetIpMacBind function. | 2022-12-02 | 7.5 | CVE-2022-45657 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the schedEndTime parameter in the setSchedWifi function. | 2022-12-02 | 7.5 | CVE-2022-45658 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the wpapsk_crypto parameter in the fromSetWirelessRepeat function. | 2022-12-02 | 7.5 | CVE-2022-45659 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the schedStartTime parameter in the setSchedWifi function. | 2022-12-02 | 7.5 | CVE-2022-45660 MISC |
tendacn -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 was discovered to contain a buffer overflow via the time parameter in the setSmartPowerManagement function. | 2022-12-02 | 7.5 | CVE-2022-45661 MISC |
thinkphp -- thinkphp | Thinkphp 5.1.41 and 5.0.24 has a code logic error which causes file upload getshell. | 2022-12-06 | 8.8 | CVE-2022-44289 MISC |
tibco -- nimbus | The Web Client component of TIBCO Software Inc.'s TIBCO Nimbus contains an easily exploitable vulnerability that allows an unauthenticated attacker with network access to exploit an open redirect on the affected system. A successful attack using this vulnerability requires human interaction from a person other than the attacker. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: version 10.5.0. | 2022-12-06 | 9.3 | CVE-2022-41559 CONFIRM |
ui -- edgemax_edgerouter_firmware | A remote code execution vulnerability in EdgeRouters (Version 2.0.9-hotfix.4 and earlier) allows a malicious actor with an operator account to run arbitrary administrator commands.This vulnerability is fixed in Version 2.0.9-hotfix.5 and later. | 2022-12-05 | 8.8 | CVE-2022-43553 MISC |
unimo -- udr-ja1604_firmware | Hidden functionality vulnerability in UDR-JA1604/UDR-JA1608/UDR-JA1616 firmware versions 71x10.1.107112.43A and earlier allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings. | 2022-12-07 | 8.8 | CVE-2022-43464 MISC MISC |
unimo -- udr-ja1604_firmware | OS command injection vulnerability in UDR-JA1604/UDR-JA1608/UDR-JA1616 firmware versions 71x10.1.107112.43A and earlier allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings. | 2022-12-07 | 8.8 | CVE-2022-44606 MISC MISC |
unimo -- udr-ja1604_firmware | Improper authentication vulnerability in UDR-JA1604/UDR-JA1608/UDR-JA1616 firmware versions 71x10.1.107112.43A and earlier allows a remote authenticated attacker to execute an arbitrary OS command on the device or alter the device settings. | 2022-12-07 | 8.8 | CVE-2022-44620 MISC MISC |
veeam -- veeam_backup_for_google_cloud | Improper authentication in Veeam Backup for Google Cloud v1.0 and v3.0 allows attackers to bypass authentication mechanisms. | 2022-12-05 | 9.8 | CVE-2022-43549 MISC |
veritas -- netbackup_flex_scale_appliance | An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Unauthenticated remote command execution can occur via the management portal. | 2022-12-04 | 9.8 | CVE-2022-46414 MISC |
veritas -- netbackup_flex_scale_appliance | An issue was discovered in Veritas NetBackup Flex Scale through 3.0. An attacker with non-root privileges may escalate privileges to root by using specific commands. | 2022-12-04 | 8.8 | CVE-2022-46410 MISC |
veritas -- netbackup_flex_scale_appliance | An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. A default password is persisted after installation and may be discovered and used to escalate privileges. | 2022-12-04 | 8.8 | CVE-2022-46411 MISC |
veritas -- netbackup_flex_scale_appliance | An issue was discovered in Veritas NetBackup Flex Scale through 3.0. A non-privileged user may escape a restricted shell and execute privileged commands. | 2022-12-04 | 8.8 | CVE-2022-46412 MISC |
veritas -- netbackup_flex_scale_appliance | An issue was discovered in Veritas NetBackup Flex Scale through 3.0 and Access Appliance through 8.0.100. Authenticated remote command execution can occur via the management portal. | 2022-12-04 | 8.8 | CVE-2022-46413 MISC |
videolan -- vlc_media_player | An integer overflow in the VNC module in VideoLAN VLC Media Player through 3.0.17.4 allows attackers, by tricking a user into opening a crafted playlist or connecting to a rogue VNC server, to crash VLC or execute code under some conditions. | 2022-12-06 | 7.8 | CVE-2022-41325 MISC MISC MISC DEBIAN |
vim -- vim | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742. | 2022-12-03 | 9.8 | CVE-2022-3491 CONFIRM MISC |
vim -- vim | Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765. | 2022-12-02 | 9.8 | CVE-2022-3520 MISC CONFIRM |
vim -- vim | Use After Free in GitHub repository vim/vim prior to 9.0.0789. | 2022-12-02 | 7.8 | CVE-2022-3591 MISC CONFIRM |
vim -- vim | Use After Free in GitHub repository vim/vim prior to 9.0.0882. | 2022-12-05 | 7.8 | CVE-2022-4292 CONFIRM MISC |
warehouse_management_system_project -- warehouse_management_system | A vulnerability, which was classified as critical, has been found in FeMiner wms. Affected by this issue is some unknown functionality of the file /product/savenewproduct.php?flag=1. The manipulation of the argument upfile leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214760. | 2022-12-03 | 9.8 | CVE-2022-4272 MISC MISC |
webtareas_project -- webtareas | webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in deleteapprovalstages.php. | 2022-12-02 | 9.8 | CVE-2022-44290 MISC MISC |
webtareas_project -- webtareas | webTareas 2.4p5 was discovered to contain a SQL injection vulnerability via the id parameter in phasesets.php. | 2022-12-02 | 9.8 | CVE-2022-44291 MISC MISC |
wordpress_popular_posts_project -- wordpress_popular_posts | External initialization of trusted variables or data stores vulnerability exists in WordPress Popular Posts 6.0.5 and earlier, therefore the vulnerable product accepts untrusted external inputs to update certain internal variables. As a result, the number of views for an article may be manipulated through a crafted input. | 2022-12-07 | 7.5 | CVE-2022-43468 MISC MISC MISC |
wp-ecommerce -- easy_wp_smtp | Auth. Remote Code Execution vulnerability in Easy WP SMTP plugin <= 1.5.1 on WordPress. | 2022-12-06 | 8.8 | CVE-2022-42699 MISC |
wp-ecommerce -- easy_wp_smtp | Auth. Path Traversal vulnerability in Easy WP SMTP plugin <= 1.5.1 at WordPress. | 2022-12-06 | 8.1 | CVE-2022-45829 MISC |
wp_csv_exporter_project -- wp_csv_exporter | The WP CSV Exporter WordPress plugin before 1.3.7 does not properly sanitise and escape some parameters before using them in a SQL statement, allowing high privilege users such as admin to perform SQL injection attacks | 2022-12-05 | 7.2 | CVE-2022-3249 MISC |
xjd2020 -- fastcms | A vulnerability was found in FastCMS. It has been rated as critical. This issue affects some unknown processing of the file /template/edit of the component Template Handler. The manipulation leads to injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-214901 was assigned to this vulnerability. | 2022-12-06 | 8.8 | CVE-2022-4300 N/A N/A MISC |
yithemes -- yith_woocommerce_gift_cards | Unauth. Arbitrary File Upload vulnerability in YITH WooCommerce Gift Cards premium plugin <= 3.19.0 on WordPress. | 2022-12-06 | 9.8 | CVE-2022-45359 MISC |
zabbix -- frontend | Zabbix Frontend provides a feature that allows admins to maintain the installation and ensure that only certain IP addresses can access it. In this way, any user will not be able to access the Zabbix Frontend while it is being maintained and possible sensitive data will be prevented from being disclosed. An attacker can bypass this protection and access the instance using IP address not listed in the defined range. | 2022-12-05 | 9.8 | CVE-2022-43515 MISC |
zabbix -- zabbix | A Firewall Rule which allows all incoming TCP connections to all programs from any source and to all ports is created in Windows Firewall after Zabbix agent installation (MSI) | 2022-12-05 | 9.8 | CVE-2022-43516 MISC |
zimbra -- collaboration | An issue was discovered in Zimbra Collaboration (ZCS) 8.8.15 and 9.0. Remote code execution can occur through ClientUploader by an authenticated admin user. An authenticated admin user can upload files through the ClientUploader utility, and traverse to any other directory for remote code execution. | 2022-12-05 | 7.2 | CVE-2022-45912 MISC |
zkteco -- zktime | A default username and password for an administrator account was discovered in ZKTeco ZKTime 10.0 through 11.1.0, builds 20180901, 20190510.1, 20200309.3, 20200930, 20201231, and 20210220. | 2022-12-06 | 7.5 | CVE-2021-39434 MISC |
Medium Vulnerabilities
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
2kblater -- 2kb_amazon_affiliates_store | Reflected Cross-Site Scripting (XSS) vulnerability in 2kb Amazon Affiliates Store plugin <=2.1.5 on WordPress. | 2022-12-04 | 6.1 | CVE-2022-40968 MISC |
add_comments_project -- add_comments | The Add Comments WordPress plugin through 1.0.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | 2022-12-05 | 4.8 | CVE-2022-3909 MISC |
addonspress -- advanced_import | The Advanced Import WordPress plugin before 1.3.8 does not have CSRF check when installing and activating plugins, which could allow attackers to make a logged in admin install arbitrary plugins from WordPress.org, and activate arbitrary ones from the blog via CSRF attacks | 2022-12-05 | 6.5 | CVE-2022-3677 MISC |
advanced_wp_columns_project -- advanced_wp_columns | The Advanced WP Columns WordPress plugin through 2.0.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | 2022-12-05 | 4.8 | CVE-2022-3426 MISC |
apache -- commons_net | Prior to Apache Commons Net 3.9.0, Net's FTP client trusts the host from PASV response by default. A malicious server can redirect the Commons Net code to use a different host, but the user has to connect to the malicious server in the first place. This may lead to leakage of information about services running on the private network of the client. The default in version 3.9.0 is now false to ignore such hosts, as cURL does. See https://issues.apache.org/jira/browse/NET-711. | 2022-12-03 | 6.5 | CVE-2021-37533 CONFIRM MLIST |
auto\/taxi_stand_management_system_project -- auto\/taxi_stand_management_system | AutoTaxi Stand Management System v1.0 was discovered to contain a cross-site scripting (XSS) vulnerability via the component search.php. | 2022-12-06 | 6.1 | CVE-2022-43369 MISC MISC |
awstats -- awstats | AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks. | 2022-12-04 | 6.1 | CVE-2022-46391 MISC MLIST |
bd -- bodyguard_999-603_firmware | The BD BodyGuard™ infusion pumps specified allow for access through the RS-232 (serial) port interface. If exploited, threat actors with physical access, specialized equipment and knowledge may be able to configure or disable the pump. No electronic protected health information (ePHI), protected health information (PHI) or personally identifiable information (PII) is stored in the pump. | 2022-12-05 | 5.3 | CVE-2022-43557 MISC |
beappsmobile -- pc_keyboard_wifi_\&_bluetooth | PC Keyboard WiFi & Bluetooth allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N | 2022-12-02 | 5.9 | CVE-2022-45480 MISC |
beetl-bbs_project -- beetl-bbs | A vulnerability was found in xiandafu beetl-bbs. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file WebUtils.java. The manipulation of the argument user leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215107. | 2022-12-08 | 5.4 | CVE-2022-4347 N/A N/A |
book_store_management_system_project -- book_store_management_system | A cross-site scripting (XSS) vulnerability in Book Store Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name parameter under the Add New System User module. | 2022-12-02 | 5.4 | CVE-2022-45215 MISC MISC |
book_store_management_system_project -- book_store_management_system | A cross-site scripting (XSS) vulnerability in Book Store Management System v1.0.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Level parameter under the Add New System User module. | 2022-12-07 | 5.4 | CVE-2022-45217 MISC MISC |
clicshopping -- clicshopping_v3 | A cross-site scripting (XSS) vulnerability in ClicShopping_V3 v3.402 allows attackers to execute arbitrary web scripts or HTML via a crafted URL parameter. | 2022-12-05 | 6.1 | CVE-2022-45769 MISC |
concretecms -- concrete_cms | Concrete CMS (formerly concrete5) below 8.5.10 and between 9.0.0 and 9.1.2 is vulnerable to XSS in the text input field since the result dashboard page output is not sanitized. The Concrete CMS security team has ranked this 4.2 with CVSS v3.1 vector AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N Thanks @_akbar_jafarli_ for reporting. Remediate by updating to Concrete CMS 8.5.10 and Concrete CMS 9.1.3. | 2022-12-05 | 6.1 | CVE-2022-43556 MISC MISC MISC |
contest-gallery -- contest_gallery | Unauth. Stored Cross-Site Scripting (XSS) vulnerability in Contest Gallery plugin <= 13.1.0.9 on WordPress. | 2022-12-06 | 6.1 | CVE-2022-45848 MISC |
crowdstrike -- falcon | CrowdStrike Falcon 6.44.15806 allows an administrative attacker to uninstall Falcon Sensor, bypassing the intended protection mechanism in which uninstallation requires possessing a one-time token. (The sensor is managed at the kernel level.) | 2022-12-04 | 4.9 | CVE-2022-44721 MISC |
dev4press -- gd_bbpress_attachments | Auth. Stored Cross-Site Scripting (XSS) vulnerability in GD bbPress Attachments plugin <= 4.3.1 on WordPress. | 2022-12-06 | 5.4 | CVE-2022-45816 MISC |
discourse -- discourse | Discourse is an open-source discussion platform. In version 2.8.13 and prior on the `stable` branch and version 2.9.0.beta14 and prior on the `beta` and `tests-passed` branches, any authenticated user can create an unlisted topic. These topics, which are not readily available to other users, can take up unnecessary site resources. A patch for this issue is available in the `main` branch of Discourse. There are no known workarounds available. | 2022-12-02 | 4.3 | CVE-2022-46159 MISC MISC |
duxcms_project -- duxcms | A vulnerability was found in annyshow DuxCMS 2.1. It has been classified as problematic. This affects an unknown part of the file admin.php&r=article/AdminContent/edit of the component Article Handler. The manipulation of the argument content leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215115. | 2022-12-08 | 5.4 | CVE-2020-36609 MISC MISC |
ecommerce-website_project -- ecommerce-website | A cross-site scripting (XSS) vulnerability in the component /signup_script.php of Ecommerce-Website v1.0 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the eMail parameter. | 2022-12-05 | 6.1 | CVE-2022-45990 MISC |
elbtide -- advanced_booking_calendar | Cross-Site Request Forgery (CSRF) vulnerability in Advanced Booking Calendar plugin <= 1.7.1 on WordPress. | 2022-12-05 | 6.5 | CVE-2022-45824 MISC |
enhancesoft -- osticket | Cross-site Scripting (XSS) - Reflected in GitHub repository osticket/osticket prior to 1.16.4. | 2022-12-02 | 5.4 | CVE-2022-4271 CONFIRM MISC |
fortinet -- fortiadc | Multiple instances of improper input validation vulnerability in Fortinet FortiADC version 7.1.0, version 7.0.0 through 7.0.2 and version 6.2.4 and below allows an authenticated attacker to retrieve files with specific extension from the underlying Linux system via crafted HTTP requests. | 2022-12-06 | 6.5 | CVE-2022-33876 MISC |
fortinet -- fortios | A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiOS 6.0.7 - 6.0.15, 6.2.2 - 6.2.12, 6.4.0 - 6.4.9 and 7.0.0 - 7.0.3 allows a privileged attacker to execute unauthorized code or commands via storing malicious payloads in replacement messages. | 2022-12-06 | 5.4 | CVE-2022-40680 MISC |
fortinet -- fortisoar | Improper neutralization of input during web page generation [CWE-79] in FortiSOAR 7.0.0 through 7.0.3 and 7.2.0 may allow an authenticated attacker to inject HTML tags via input fields of various components within FortiSOAR. | 2022-12-06 | 5.4 | CVE-2022-38379 MISC |
fsi -- fs040u_firmware | Plaintext storage of a password vulnerability exists in +F FS040U software versions v2.3.4 and earlier, which may allow an attacker to obtain the login password of +F FS040U and log in to the management console. | 2022-12-05 | 4.6 | CVE-2022-43442 MISC MISC MISC MISC MISC |
google -- android | In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446207; Issue ID: ALPS07446207. | 2022-12-05 | 6.7 | CVE-2022-32594 MISC |
google -- android | In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446213; Issue ID: ALPS07446213. | 2022-12-05 | 6.7 | CVE-2022-32596 MISC |
google -- android | In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446228; Issue ID: ALPS07446228. | 2022-12-05 | 6.7 | CVE-2022-32597 MISC |
google -- android | In widevine, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07446228; Issue ID: ALPS07446228. | 2022-12-05 | 6.7 | CVE-2022-32598 MISC |
google -- android | In keyinstall, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07439659; Issue ID: ALPS07439659. | 2022-12-05 | 6.7 | CVE-2022-32619 MISC |
google -- android | In mpu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07541753; Issue ID: ALPS07541753. | 2022-12-05 | 6.7 | CVE-2022-32620 MISC |
google -- android | In gz, there is a possible memory corruption due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363786; Issue ID: ALPS07363786. | 2022-12-05 | 6.7 | CVE-2022-32622 MISC |
google -- android | In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405923; Issue ID: ALPS07405923. | 2022-12-05 | 6.7 | CVE-2022-32624 MISC |
google -- android | In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326216; Issue ID: ALPS07326216. | 2022-12-05 | 6.7 | CVE-2022-32625 MISC |
google -- android | In display, there is a possible out of bounds write due to an incorrect bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07326239; Issue ID: ALPS07326239. | 2022-12-05 | 6.7 | CVE-2022-32626 MISC |
google -- android | In isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310780; Issue ID: ALPS07310780. | 2022-12-05 | 6.7 | CVE-2022-32628 MISC |
google -- android | In isp, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310774; Issue ID: ALPS07310774. | 2022-12-05 | 6.7 | CVE-2022-32629 MISC |
google -- android | In throttling, there is a possible out of bounds write due to an incorrect calculation of buffer size. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07405966; Issue ID: ALPS07405966. | 2022-12-05 | 6.7 | CVE-2022-32630 MISC |
google -- android | In Wi-Fi, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453613; Issue ID: ALPS07453613. | 2022-12-05 | 6.7 | CVE-2022-32631 MISC |
google -- android | In Wi-Fi, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441630; Issue ID: ALPS07441630. | 2022-12-05 | 6.7 | CVE-2022-32632 MISC |
google -- android | In Wi-Fi, there is a possible memory access violation due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441637; Issue ID: ALPS07441637. | 2022-12-05 | 6.7 | CVE-2022-32633 MISC |
google -- android | In ccci, there is a possible out of bounds write due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07138646; Issue ID: ALPS07138646. | 2022-12-05 | 6.7 | CVE-2022-32634 MISC |
google -- android | In isp, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07310829; Issue ID: ALPS07310829. | 2022-12-05 | 6.4 | CVE-2022-32621 MISC |
google -- android | In sensor driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-39106 MISC |
google -- android | In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-39129 MISC |
google -- android | In face detect driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-39130 MISC |
google -- android | In camera driver, there is a possible memory corruption due to improper locking. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-39131 MISC |
google -- android | In camera driver, there is a possible out of bounds write due to a missing bounds check. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-39132 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-39133 MISC |
google -- android | Exposure of Sensitive Information vulnerability in kernel prior to SMR Dec-2022 Release 1 allows attackers to access the kernel address information via log. | 2022-12-08 | 5.5 | CVE-2022-39897 MISC |
google -- android | Implicit intent hijacking vulnerability in Telecom application prior to SMR Dec-2022 Release 1 allows attacker to access sensitive information via implicit intent. | 2022-12-08 | 5.5 | CVE-2022-39905 MISC |
google -- android | In npu driver, there is a memory corruption due to a use after free. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-42754 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42755 MISC |
google -- android | In sensor driver, there is a possible buffer overflow due to a missing bounds check. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-42756 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42759 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42760 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42761 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42762 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42763 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42764 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42765 MISC |
google -- android | In wlan driver, there is a possible missing permission check, This could lead to local information disclosure. | 2022-12-06 | 5.5 | CVE-2022-42766 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42772 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42773 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42774 MISC |
google -- android | In camera driver, there is a possible memory corruption due to improper locking. This could lead to local denial of service in kernel. | 2022-12-06 | 5.5 | CVE-2022-42775 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42779 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42780 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 5.5 | CVE-2022-42781 MISC |
google -- android | In wlan driver, there is a possible missing permission check, This could lead to local information disclosure. | 2022-12-06 | 5.5 | CVE-2022-42782 MISC |
google -- android | In audio driver, there is a use after free due to a race condition. This could lead to local denial of service in kernel. | 2022-12-06 | 4.7 | CVE-2022-39134 MISC |
google -- android | In wlan driver, there is a race condition, This could lead to local denial of service in wlan services. | 2022-12-06 | 4.7 | CVE-2022-42770 MISC |
google -- android | In wlan driver, there is a race condition, This could lead to local denial of service in wlan services. | 2022-12-06 | 4.7 | CVE-2022-42771 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 4.3 | CVE-2022-42768 MISC |
haxx -- curl | curl can be told to parse a `.netrc` file for credentials. If that file endsin a line with 4095 consecutive non-white space letters and no newline, curlwould first read past the end of the stack-based buffer, and if the readworks, write a zero byte beyond its boundary.This will in most cases cause a segfault or similar, but circumstances might also cause different outcomes.If a malicious user can provide a custom netrc file to an application or otherwise affect its contents, this flaw could be used as denial-of-service. | 2022-12-05 | 6.5 | CVE-2022-35260 MISC |
human_resource_management_system_project -- human_resource_management_system | A vulnerability classified as problematic has been found in SourceCodester Human Resource Management System 1.0. Affected is an unknown function of the file /hrm/employeeview.php. The manipulation of the argument search leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214776. | 2022-12-03 | 6.1 | CVE-2022-4279 N/A N/A |
ibm -- business_automation_workflow | IBM Business Process Manager 21.0.1 through 21.0.3.1, 20.0.0.1 through 20.0.0.2 19.0.0.1 through 19.0.0.3 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 65687. | 2022-12-07 | 6.1 | CVE-2022-41735 MISC MISC |
ilias -- ilias | ILIAS before 7.16 allows External Control of File Name or Path. | 2022-12-07 | 6.5 | CVE-2022-45918 MISC FULLDISC MISC |
ilias -- ilias | ILIAS before 7.16 has an Open Redirect. | 2022-12-07 | 6.1 | CVE-2022-45917 MISC FULLDISC MISC |
ilias -- ilias | ILIAS before 7.16 allows XSS. | 2022-12-07 | 5.4 | CVE-2022-45916 MISC FULLDISC MISC |
ivanti -- endpoint_manager | ZTE OTCP product is impacted by a permission and access control vulnerability. Due to improper permission settings, an attacker with high permissions could use this vulnerability to maliciously delete and modify files. | 2022-12-05 | 6.5 | CVE-2022-23143 MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'datef' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4208 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'pointsf' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4209 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dnf' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4210 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'emailf' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4211 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'ipf' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4212 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'dn' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4213 MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'ip' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4214 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'date' parameter on the 'chainedquiz_list' page in versions up to, and including, 1.3.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | 2022-12-02 | 6.1 | CVE-2022-4215 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'facebook_appid' parameter in versions up to, and including, 1.3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2022-12-02 | 4.8 | CVE-2022-4216 MISC MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'api_key' parameter in versions up to, and including, 1.3.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrative privileges to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. | 2022-12-02 | 4.8 | CVE-2022-4217 MISC MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.2.4. This is due to missing nonce validation on the list_quizzes() function. This makes it possible for unauthenticated attackers to delete quizzes and copy quizzes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2022-12-02 | 4.3 | CVE-2022-4218 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.2.4. This is due to missing nonce validation on the manage() function. This makes it possible for unauthenticated attackers to delete submitted quiz responses via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2022-12-02 | 4.3 | CVE-2022-4219 MISC MISC MISC |
kibokolabs -- chained_quiz | The Chained Quiz plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.3.2.4. This is due to missing nonce validation on the list_questions() function. This makes it possible for unauthenticated attackers to delete questions from quizzes via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. | 2022-12-02 | 4.3 | CVE-2022-4220 MISC MISC MISC MISC |
kwoksys -- information_server | An XML external entity (XXE) injection vulnerability in Kwoksys Kwok Information Server before v2.9.5.SP31 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks. | 2022-12-06 | 4.9 | CVE-2022-45326 MISC MISC |
kyocera -- taskalfa_7550ci_firmware | Session information easily guessable vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to log in to the product by spoofing a user with guessed session information. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN. | 2022-12-05 | 6.5 | CVE-2022-41798 MISC MISC MISC |
kyocera -- taskalfa_7550ci_firmware | Missing authorization vulnerability exists in Kyocera Document Solutions MFPs and printers, which may allow a network-adjacent attacker to alter the product settings without authentication by sending a specially crafted request. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN. | 2022-12-05 | 6.5 | CVE-2022-41807 MISC MISC MISC |
kyocera -- taskalfa_7550ci_firmware | Stored cross-site scripting vulnerability in Kyocera Document Solutions MFPs and printers allows a remote authenticated attacker with an administrative privilege to inject arbitrary script. Affected products/versions are as follows: TASKalfa 7550ci/6550ci, TASKalfa 5550ci/4550ci/3550ci/3050ci, TASKalfa 255c/205c, TASKalfa 256ci/206ci, ECOSYS M6526cdn/M6526cidn, FS-C2126MFP/C2126MFP+/C2026MFP/C2026MFP+, TASKalfa 8000i/6500i, TASKalfa 5500i/4500i/3500i, TASKalfa 305/255, TASKalfa 306i/256i, LS-3140MFP/3140MFP+/3640MFP, ECOSYS M2535dn, LS-1135MFP/1035MFP, LS-C8650DN/C8600DN, ECOSYS P6026cdn, FS-C5250DN, LS-4300DN/4200DN/2100DN, ECOSYS P4040dn, ECOSYS P2135dn, and FS-1370DN. | 2022-12-05 | 4.8 | CVE-2022-41830 MISC MISC MISC |
lazy_mouse_project -- lazy_mouse | Lazy Mouse allows an attacker (in a man in the middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N | 2022-12-02 | 5.9 | CVE-2022-45483 MISC |
linux -- linux_kernel | A flaw was found in the Linux kernel Traffic Control (TC) subsystem. Using a specific networking configuration (redirecting egress packets to ingress using TC action "mirred") a local unprivileged user could trigger a CPU soft lockup (ABBA deadlock) when the transport protocol in use (TCP or SCTP) does a retransmission, resulting in a denial of service condition. | 2022-12-05 | 5.5 | CVE-2022-4269 MISC |
mingsoft -- mcms | A vulnerability, which was classified as problematic, was found in Mingsoft MCMS 5.2.8. Affected is an unknown function of the file search.do. The manipulation of the argument content_title leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215112. | 2022-12-08 | 6.1 | CVE-2022-4350 MISC MISC |
oceanwp -- sticky_header | Cross-Site Request Forgery (CSRF) vulnerability in Oceanwp sticky header plugin <= 1.0.8 on WordPress. | 2022-12-04 | 6.5 | CVE-2022-35730 MISC |
online_leave_management_system_project -- online_leave_management_system | Online Leave Management System v1.0 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the component /leave_system/admin/?page=maintenance/department. This vulnerability allows attackers to execute arbitrary web scripts or HTML via crafted payload injected into the Name field under the Create New module. | 2022-12-07 | 4.8 | CVE-2022-45008 MISC |
openrazer_project -- openrazer | OpenRazer is an open source driver and user-space daemon to control Razer device lighting and other features on GNU/Linux. Using a modified USB device an attacker can leak stack addresses of the `razer_attr_read_dpi_stages`, potentially bypassing KASLR. To exploit this vulnerability an attacker would need to access to a users keyboard or mouse or would need to convince a user to use a modified device. The issue has been patched in v3.5.1. Users are advised to upgrade and should be reminded not to plug in unknown USB devices. | 2022-12-05 | 4.6 | CVE-2022-23467 MISC MISC |
pinterest -- querybook | Querybook is an open source data querying UI. In affected versions user provided data is not escaped in the error field of the auth callback url in `querybook/server/app/auth/oauth_auth.py` and `querybook/server/app/auth/okta_auth.py`. This may allow attackers to perform reflected cross site scripting (XSS) if Content Security Policy (CSP) is not enabled or `unsafe-inline` is allowed. Users are advised to upgrade to the latest, patched version of querybook (version 3.14.2 or greater). Users unable to upgrade may enable CSP and not allow unsafe-inline or manually escape query parameters in a reverse proxy. | 2022-12-06 | 6.1 | CVE-2022-46151 MISC MISC |
pwn_project -- pwn | A vulnerability classified as problematic has been found in CTF-hacker pwn. This affects an unknown part of the file delete.html. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-215109 was assigned to this vulnerability. | 2022-12-08 | 6.8 | CVE-2022-4349 N/A N/A |
rapidscada -- rapid_scada | Rapid Software LLC Rapid SCADA 5.8.4 is vulnerable to Cross Site Scripting (XSS). | 2022-12-07 | 6.1 | CVE-2022-44153 MISC |
ricoh -- aficio_sp_4210n_firmware | Cross-site scripting vulnerability in Aficio SP 4210N firmware versions prior to Web Support 1.05 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. | 2022-12-07 | 4.8 | CVE-2022-37406 MISC MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Announcement function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field. | 2022-12-02 | 5.4 | CVE-2022-44944 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add Page function at /index.php?module=help_pages/pages&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Title field. | 2022-12-02 | 5.4 | CVE-2022-44946 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Highlight Row feature at /index.php?module=entities/listing_types&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Note field after clicking "Add". | 2022-12-02 | 5.4 | CVE-2022-44947 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Entities Group feature at/index.php?module=entities/entities_groups. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field after clicking "Add". | 2022-12-02 | 5.4 | CVE-2022-44948 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Short Name field. | 2022-12-02 | 5.4 | CVE-2022-44949 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Field function at /index.php?module=entities/fields&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | 2022-12-02 | 5.4 | CVE-2022-44950 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in the Add New Form tab function at /index.php?module=entities/forms&entities_id=24. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | 2022-12-02 | 5.4 | CVE-2022-44951 MISC MISC |
rukovoditel -- rukovoditel | Rukovoditel v3.2.1 was discovered to contain a stored cross-site scripting (XSS) vulnerability in /index.php?module=configuration/application. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Copyright Text field after clicking "Add". | 2022-12-02 | 5.4 | CVE-2022-44952 MISC MISC |
ruoyi -- ruoyi-cloud | A vulnerability was found in y_project RuoYi-Cloud. It has been rated as problematic. Affected by this issue is some unknown functionality of the component JSON Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-215108. | 2022-12-08 | 6.1 | CVE-2022-4348 N/A N/A |
salonbookingsystem -- salon_booking_system | Cross-site scripting vulnerability in Salon booking system versions prior to 7.9 allows a remote unauthenticated attacker to inject an arbitrary script. | 2022-12-05 | 6.1 | CVE-2022-43487 MISC MISC MISC |
sangoma -- asterisk | An issue was discovered in Sangoma Asterisk through 16.28, 17 and 18 through 18.14, 19 through 19.6, and certified through 18.9-cert1. GetConfig, via Asterisk Manager Interface, allows a connected application to access files outside of the asterisk configuration directory, aka Directory Traversal. | 2022-12-05 | 4.9 | CVE-2022-42706 MISC |
sangoma -- certified_asterisk | A use-after-free in res_pjsip_pubsub.c in Sangoma Asterisk 16.28, 18.14, 19.6, and certified/18.9-cert2 may allow a remote authenticated attacker to crash Asterisk (denial of service) by performing activity on a subscription via a reliable transport at the same time that Asterisk is also performing activity on that subscription. | 2022-12-05 | 6.5 | CVE-2022-42705 MISC |
ss-proj -- shirasagi | Open redirect vulnerability in SHIRASAGI v1.14.4 to v1.15.0 allows a remote unauthenticated attacker to redirect users to an arbitrary web site and conduct a phishing attack. | 2022-12-05 | 6.1 | CVE-2022-43479 MISC MISC MISC MISC |
ss-proj -- shirasagi | Stored cross-site scripting vulnerability in SHIRASAGI versions prior to v1.16.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. | 2022-12-05 | 5.4 | CVE-2022-43499 MISC MISC MISC MISC |
stackstorm -- stackstorm | Cross-site scripting (XSS) vulnerability in the Web UI of StackStorm versions prior to 3.8.0 allowed logged in users with write access to pack rules to inject arbitrary script or HTML that may be executed in Web UI for other logged in users. | 2022-12-05 | 5.4 | CVE-2022-43706 MISC |
telegram -- telegram | ** DISPUTED ** Telegram Web 15.3.1 allows XSS via a certain payload derived from a Target Corporation website. NOTE: some third parties have been unable to discern any relationship between the Pastebin information and a possible XSS finding. | 2022-12-06 | 6.1 | CVE-2022-43363 MISC MISC |
telepad-app -- telepad | Telepad allows an attacker (in a man-in-the-middle position between the server and a connected device) to see all data (including keypresses) in cleartext. CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N | 2022-12-05 | 5.9 | CVE-2022-45478 MISC |
teler_project -- teler | teler is an real-time intrusion detection and threat alert dashboard. teler prior to version 2.0.0-rc.4 is vulnerable to DOM-based cross-site scripting (XSS) in the teler dashboard. When teler requests messages from the event stream on the `/events` endpoint, the log data displayed on the dashboard are not sanitized. This only affects authenticated users and can only be exploited based on detected threats if the log contains a DOM scripting payload. This vulnerability has been fixed on version `v2.0.0-rc.4`. Users are advised to upgrade. There are no known workarounds for this vulnerability. | 2022-12-06 | 5.4 | CVE-2022-23466 MISC MISC |
tenda -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet. | 2022-12-02 | 6.5 | CVE-2022-45673 MISC |
tenda -- ac6_firmware | Tenda AC6V1.0 V15.03.05.19 is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot. | 2022-12-02 | 6.5 | CVE-2022-45674 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolRestoreSet. | 2022-12-02 | 6.5 | CVE-2022-45667 MISC |
tenda -- i22_firmware | Tenda i22 V1.0.0.3(4687) is vulnerable to Cross Site Request Forgery (CSRF) via function fromSysToolReboot. | 2022-12-02 | 6.5 | CVE-2022-45668 MISC |
themeum -- wp_page_builder | The WP Page Builder WordPress plugin through 1.2.8 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | 2022-12-05 | 4.8 | CVE-2022-3830 MISC |
tibco -- nimbus | The Statement Set Upload via the Web Client component of TIBCO Software Inc.'s TIBCO Nimbus contains an easily exploitable vulnerability that allows a low privileged attacker with network access to execute a Denial of Service Attack on the affected system. Affected releases are TIBCO Software Inc.'s TIBCO Nimbus: version 10.5.0. | 2022-12-06 | 6.5 | CVE-2022-41560 CONFIRM |
tomexam -- tomexam | Cross Site Scripting (XSS) vulnerability in TomExam 3.0 via p_name parameter to list.thtml. | 2022-12-05 | 5.4 | CVE-2021-34181 MISC |
tp-link -- re3000_firmware | tdpServer of TP-Link RE300 V1 improperly processes its input, which may allow an attacker to cause a denial-of-service (DoS) condition of the product's OneMesh function. | 2022-12-07 | 5.5 | CVE-2022-41783 MISC MISC |
tp-link -- tl-wr740n_firmware | A vulnerability classified as problematic has been found in TP-Link TL-WR740N. Affected is an unknown function of the component ARP Handler. The manipulation leads to resource consumption. The attack needs to be done within the local network. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-214812. | 2022-12-06 | 5.5 | CVE-2022-4296 MISC MISC |
user_registration_\&_user_management_system_project -- user_registration_\&_user_management_system | Phpgurukul User Registration & User Management System v3.0 was discovered to contain multiple stored cross-site scripting (XSS) vulnerabilities via the firstname and lastname parameters of the registration form & login pages. | 2022-12-05 | 5.4 | CVE-2022-43097 MISC |
vim -- vim | Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804. | 2022-12-05 | 5.5 | CVE-2022-4293 CONFIRM MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /linkedcontent/listfiles.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field after clicking "Add". | 2022-12-02 | 5.4 | CVE-2022-44953 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /contacts/listcontacts.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Last Name field after clicking "Add". | 2022-12-02 | 5.4 | CVE-2022-44954 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the Chat function. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Messages field. | 2022-12-02 | 5.4 | CVE-2022-44955 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /projects/listprojects.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | 2022-12-02 | 5.4 | CVE-2022-44956 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /clients/listclients.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | 2022-12-02 | 5.4 | CVE-2022-44957 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /meetings/listmeetings.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | 2022-12-02 | 5.4 | CVE-2022-44959 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /general/search.php?searchtype=simple. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Search field. | 2022-12-02 | 5.4 | CVE-2022-44960 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /forums/editforum.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Name field. | 2022-12-02 | 5.4 | CVE-2022-44961 MISC MISC |
webtareas_project -- webtareas | webtareas 2.4p5 was discovered to contain a cross-site scripting (XSS) vulnerability in the component /calendar/viewcalendar.php. This vulnerability allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Subject field. | 2022-12-02 | 5.4 | CVE-2022-44962 MISC MISC |
wordpress -- wordpress | Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script . | 2022-12-05 | 6.1 | CVE-2022-43497 MISC MISC MISC |
wordpress -- wordpress | Cross-site scripting vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to inject an arbitrary script . | 2022-12-05 | 6.1 | CVE-2022-43500 MISC MISC MISC |
wordpress -- wordpress | Improper authentication vulnerability in WordPress versions prior to 6.0.3 allows a remote unauthenticated attacker to obtain the email address of the user who posted a blog using the WordPress Post by Email Feature. | 2022-12-05 | 5.3 | CVE-2022-43504 MISC MISC MISC |
wp-ecommerce -- easy_wp_smtp | Auth. Path Traversal vulnerability in Easy WP SMTP plugin <= 1.5.1 on WordPress. | 2022-12-06 | 6.5 | CVE-2022-45833 MISC |
wp-oauth -- wp_oauth_server | The WP OAuth Server (OAuth Authentication) WordPress plugin before 3.4.2 does not have CSRF check when regenerating secrets, which could allow attackers to make logged in admins regenerate the secret of an arbitrary client given they know the client ID | 2022-12-05 | 6.5 | CVE-2022-3926 MISC |
wp-oauth -- wp_oauth_server | The WP OAuth Server (OAuth Authentication) WordPress plugin before 4.2.2 does not sanitize and escape Client IDs, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup) | 2022-12-05 | 4.8 | CVE-2022-3892 MISC |
wpmanage -- uji_countdown | The Uji Countdown WordPress plugin through 2.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | 2022-12-05 | 4.8 | CVE-2022-3837 MISC |
wpupper_share_buttons_project -- wpupper_share_buttons | The WPUpper Share Buttons WordPress plugin through 3.42 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | 2022-12-05 | 4.8 | CVE-2022-3838 MISC |
xylusthemes -- wp_smart_import | Unauth. Reflected Cross-Site Scripting (XSS) vulnerability in Xylus Themes WP Smart Import plugin <= 1.0.2 on WordPress. | 2022-12-06 | 6.1 | CVE-2022-40209 MISC |
zyxel -- atp800_firmware | A cross-site scripting (XSS) vulnerability in the CGI program of Zyxel ZyWALL/USG series firmware versions 4.30 through 4.72, VPN series firmware versions 4.30 through 5.31, USG FLEX series firmware versions 4.50 through 5.31, and ATP series firmware versions 4.32 through 5.31, which could allow an attacker to trick a user into visiting a crafted URL with the XSS payload. Then, the attacker could gain access to some browser-based information if the malicious script is executed on the victim’s browser. | 2022-12-06 | 6.1 | CVE-2022-40603 CONFIRM |
zzcms -- zzcms | An issue was discovered in ZZCMS 2022. There is a cross-site scripting (XSS) vulnerability in admin/ad_list.php. | 2022-12-07 | 5.4 | CVE-2022-44361 MISC |
Low Vulnerabilities
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
google -- android | Improper access control vulnerability in ContactListStartActivityHelper in Phone prior to SMR Dec-2022 Release 1 allows to access sensitive information via implicit intent. | 2022-12-08 | 3.3 | CVE-2022-39894 MISC |
google -- android | Improper access control vulnerability in ContactListUtils in Phone prior to SMR Dec-2022 Release 1 allows to access contact group information via implicit intent. | 2022-12-08 | 3.3 | CVE-2022-39895 MISC |
google -- android | Improper access control vulnerabilities in Contacts prior to SMR Dec-2022 Release 1 allows to access sensitive information via implicit intent. | 2022-12-08 | 3.3 | CVE-2022-39896 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 3.3 | CVE-2022-42757 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 3.3 | CVE-2022-42758 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 3.3 | CVE-2022-42767 MISC |
google -- android | In wlan driver, there is a possible missing bounds check, This could lead to local denial of service in wlan services. | 2022-12-06 | 3.3 | CVE-2022-42769 MISC |
hitachi -- jp1\/automatic_operation | Generation of Error Message Containing Sensitive Information vulnerability in Hitachi JP1/Automatic Operation allows local users to gain sensitive information. This issue affects JP1/Automatic Operation: from 10-00 through 10-54-03, from 11-00 before 11-51-09, from 12-00 before 12-60-01. | 2022-12-06 | 3.3 | CVE-2022-34881 MISC |
m-files -- m-files_server | Incorrect privilege assignment issue in M-Files Web in M-Files Web versions before 22.5.11436.1 could have changed permissions accidentally. | 2022-12-02 | 2.6 | CVE-2022-4270 MISC |
Severity Not Yet Assigned
Primary Vendor -- Product | Description | Published | CVSS Score | Source & Patch Info |
---|---|---|---|---|
akeneo_pim -- akeneo_pim | Akeneo PIM is an open source Product Information Management (PIM). Akeneo PIM Community Edition versions before v5.0.119 and v6.0.53 allows remote authenticated users to execute arbitrary PHP code on the server by uploading a crafted image. Akeneo PIM Community Edition after the versions aforementioned provides patched Apache HTTP server configuration file, for docker setup and in documentation sample, to fix this vulnerability. Community Edition users must change their Apache HTTP server configuration accordingly to be protected. The patch for Cloud Based Akeneo PIM Services customers has been applied since 30th October 2022. Users are advised to upgrade. Users unable to upgrade may Replace any reference to `<FilesMatch \.php$>` in their apache httpd configurations with: `<Location "/index.php">`. | 2022-12-09 | not yet calculated | CVE-2022-46157 MISC MISC |
apache -- manifoldcf | Improper neutralization of special elements used in an LDAP query ('LDAP Injection') vulnerability in ActiveDirectory and Sharepoint ActiveDirectory authority connectors of Apache ManifoldCF allows an attacker to manipulate the LDAP search queries (DoS, additional queries, filter manipulation) during user lookup, if the username or the domain string are passed to the UserACLs servlet without validation. This issue affects Apache ManifoldCF version 2.23 and prior versions. | 2022-12-07 | not yet calculated | CVE-2022-45910 MISC |
aruba -- airwave_management_platform | Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below. | 2022-12-08 | not yet calculated | CVE-2022-37916 MISC |
aruba -- airwave_management_platform | Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below. | 2022-12-08 | not yet calculated | CVE-2022-37917 MISC |
aruba -- airwave_management_platform | Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below. | 2022-12-08 | not yet calculated | CVE-2022-37918 MISC |
automotive_shop_management_system -- automotive_shop_management_system | Automotive Shop Management System v1.0 was discovered to contain a SQL injection vulnerability via the id parameter at /services/view_service.php. | 2022-12-09 | not yet calculated | CVE-2022-44838 MISC |
baota -- baota | In BAOTA linux panel there exists a stored xss vulnerability attackers can use to obtain sensitive information via the log analysis feature. | 2022-12-09 | not yet calculated | CVE-2022-4336 MISC |
basercms -- basercms | Stored cross-site scripting vulnerability in Permission Settings of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. | 2022-12-07 | not yet calculated | CVE-2022-41994 MISC MISC |
basercms -- basercms | Stored cross-site scripting vulnerability in User group management of baserCMS versions prior to 4.7.2 allows a remote authenticated attacker with an administrative privilege to inject an arbitrary script. | 2022-12-07 | not yet calculated | CVE-2022-42486 MISC MISC |
broadcom -- brocade_fabric_os | A vulnerability in Brocade Fabric OS software v9.1.1, v9.0.1e, v8.2.3c, v7.4.2j, and earlier versions could allow a remote unauthenticated attacker to execute on a Brocade Fabric OS switch commands capable of modifying zoning, disabling the switch, disabling ports, and modifying the switch IP address. | 2022-12-08 | not yet calculated | CVE-2022-33186 MISC |
broadcom -- brocade_sannav | Brocade SANnav before v2.2.1 logs usernames and encoded passwords in debug-enabled logs. The vulnerability could allow an attacker with admin privilege to read sensitive information. | 2022-12-09 | not yet calculated | CVE-2022-33187 MISC |
broadcom -- symantec_messaging_gateway | An authenticated user who has the privilege to add/edit annotations on the Content tab, can craft a malicious annotation that can be executed on the annotations page (Annotation Text Column) | 2022-12-09 | not yet calculated | CVE-2022-25629 MISC |
broadcom -- symantec_messaging_gateway | An authenticated user can embed malicious content with XSS into the admin group policy page. | 2022-12-09 | not yet calculated | CVE-2022-25630 MISC |
buffalo_inc -- multiple_products | Hidden functionality vulnerability in multiple Buffalo network devices allows a network-adjacent attacker with an administrative privilege to execute an arbitrary OS command. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and earlier, WHR-HP-GN firmware Ver. 1.87 and earlier, WPL-05G300 firmware Ver. 1.88 and earlier, WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, WZR-HP-AG300H firmware Ver. 1.76 and earlier, WZR-HP-G302H firmware Ver. 1.86 and earlier, WLAE-AG300N firmware Ver. 1.86 and earlier, FS-600DHP firmware Ver. 3.40 and earlier, FS-G300N firmware Ver. 3.14 and earlier, FS-HP-G300N firmware Ver. 3.33 and earlier, FS-R600DHP firmware Ver. 3.40 and earlier, BHR-4GRV firmware Ver. 2.00 and earlier, DWR-HP-G300NH firmware Ver. 1.84 and earlier, DWR-PG firmware Ver. 1.83 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WER-A54G54 firmware Ver. 1.43 and earlier, WER-AG54 firmware Ver. 1.43 and earlier, WER-AM54G54 firmware Ver. 1.43 and earlier, WER-AMG54 firmware Ver. 1.43 and earlier, WHR-300 firmware Ver. 2.00 and earlier, WHR-300HP firmware Ver. 2.00 and earlier, WHR-AM54G54 firmware Ver. 1.43 and earlier, WHR-AMG54 firmware Ver. 1.43 and earlier, WHR-AMPG firmware Ver. 1.52 and earlier, WHR-G firmware Ver. 1.49 and earlier, WHR-G300N firmware Ver. 1.65 and earlier, WHR-G301N firmware Ver. 1.87 and earlier, WHR-G54S firmware Ver. 1.43 and earlier, WHR-G54S-NI firmware Ver. 1.24 and earlier, WHR-HP-AMPG firmware Ver. 1.43 and earlier, WHR-HP-G firmware Ver. 1.49 and earlier, WHR-HP-G54 firmware Ver. 1.43 and earlier, WLI-H4-D600 firmware Ver. 1.88 and earlier, WLI-TX4-AG300N firmware Ver. 1.53 and earlier, WS024BF firmware Ver. 1.60 and earlier, WS024BF-NW firmware Ver. 1.60 and earlier, WZR2-G108 firmware Ver. 1.33 and earlier, WZR2-G300N firmware Ver. 1.55 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, WZR-AGL300NH firmware Ver. 1.55 and earlier, WZR-AMPG144NH firmware Ver. 1.49 and earlier, WZR-AMPG300NH firmware Ver. 1.51 and earlier, WZR-D1100H firmware Ver. 2.00 and earlier, WZR-G144N firmware Ver. 1.48 and earlier, WZR-G144NH firmware Ver. 1.48 and earlier, WZR-HP-G300NH firmware Ver. 1.84 and earlier, WZR-HP-G301NH firmware Ver. 1.84 and earlier, and WZR-HP-G450H firmware Ver. 1.90 and earlier. | 2022-12-07 | not yet calculated | CVE-2022-39044 MISC MISC |
buffalo_inc -- multiple_products | Authentication bypass vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to bypass authentication and access the device. The affected products/versions are as follows: WCR-300 firmware Ver. 1.87 and earlier, WHR-HP-G300N firmware Ver. 2.00 and earlier, WHR-HP-GN firmware Ver. 1.87 and earlier, WPL-05G300 firmware Ver. 1.88 and earlier, WRM-D2133HP firmware Ver. 2.85 and earlier, WRM-D2133HS firmware Ver. 2.96 and earlier, WTR-M2133HP firmware Ver. 2.85 and earlier, WTR-M2133HS firmware Ver. 2.96 and earlier, WXR-1900DHP firmware Ver. 2.50 and earlier, WXR-1900DHP2 firmware Ver. 2.59 and earlier, WXR-1900DHP3 firmware Ver. 2.63 and earlier, WXR-5950AX12 firmware Ver. 3.40 and earlier, WXR-6000AX12B firmware Ver. 3.40 and earlier, WXR-6000AX12S firmware Ver. 3.40 and earlier, WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, WZR-1750DHP2 firmware Ver. 2.31 and earlier, WZR-HP-AG300H firmware Ver. 1.76 and earlier, WZR-HP-G302H firmware Ver. 1.86 and earlier, WEM-1266 firmware Ver. 2.85 and earlier, WEM-1266WP firmware Ver. 2.85 and earlier, WLAE-AG300N firmware Ver. 1.86 and earlier, FS-600DHP firmware Ver. 3.40 and earlier, FS-G300N firmware Ver. 3.14 and earlier, FS-HP-G300N firmware Ver. 3.33 and earlier, FS-R600DHP firmware Ver. 3.40 and earlier, BHR-4GRV firmware Ver. 2.00 and earlier, DWR-HP-G300NH firmware Ver. 1.84 and earlier, DWR-PG firmware Ver. 1.83 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WER-A54G54 firmware Ver. 1.43 and earlier, WER-AG54 firmware Ver. 1.43 and earlier, WER-AM54G54 firmware Ver. 1.43 and earlier, WER-AMG54 firmware Ver. 1.43 and earlier, WHR-300 firmware Ver. 2.00 and earlier, WHR-300HP firmware Ver. 2.00 and earlier, WHR-AM54G54 firmware Ver. 1.43 and earlier, WHR-AMG54 firmware Ver. 1.43 and earlier, WHR-AMPG firmware Ver. 1.52 and earlier, WHR-G firmware Ver. 1.49 and earlier, WHR-G300N firmware Ver. 1.65 and earlier, WHR-G301N firmware Ver. 1.87 and earlier, WHR-G54S firmware Ver. 1.43 and earlier, WHR-G54S-NI firmware Ver. 1.24 and earlier, WHR-HP-AMPG firmware Ver. 1.43 and earlier, WHR-HP-G firmware Ver. 1.49 and earlier, WHR-HP-G54 firmware Ver. 1.43 and earlier, WLI-H4-D600 firmware Ver. 1.88 and earlier, WS024BF firmware Ver. 1.60 and earlier, WS024BF-NW firmware Ver. 1.60 and earlier, WXR-1750DHP firmware Ver. 2.60 and earlier, WXR-1750DHP2 firmware Ver. 2.60 and earlier, WZR-1166DHP firmware Ver. 2.18 and earlier, WZR-1166DHP2 firmware Ver. 2.18 and earlier, WZR-1750DHP firmware Ver. 2.30 and earlier, WZR2-G300N firmware Ver. 1.55 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, WZR-600DHP3 firmware Ver. 2.19 and earlier, WZR-900DHP2 firmware Ver. 2.19 and earlier, WZR-AGL300NH firmware Ver. 1.55 and earlier, WZR-AMPG144NH firmware Ver. 1.49 and earlier, WZR-AMPG300NH firmware Ver. 1.51 and earlier, WZR-D1100H firmware Ver. 2.00 and earlier, WZR-G144N firmware Ver. 1.48 and earlier, WZR-G144NH firmware Ver. 1.48 and earlier, WZR-HP-G300NH firmware Ver. 1.84 and earlier, WZR-HP-G301NH firmware Ver. 1.84 and earlier, WZR-HP-G450H firmware Ver. 1.90 and earlier, WZR-S1750DHP firmware Ver. 2.32 and earlier, WZR-S600DHP firmware Ver. 2.19 and earlier, and WZR-S900DHP firmware Ver. 2.19 and earlier. | 2022-12-07 | not yet calculated | CVE-2022-40966 MISC MISC |
buffalo_inc -- multiple_products | Use of hard-coded credentials vulnerability in multiple Buffalo network devices allows a network-adjacent attacker to alter?configuration settings of the device. The affected products/versions are as follows: WZR-300HP firmware Ver. 2.00 and earlier, WZR-450HP firmware Ver. 2.00 and earlier, WZR-600DHP firmware Ver. 2.00 and earlier, WZR-900DHP firmware Ver. 1.15 and earlier, HW-450HP-ZWE firmware Ver. 2.00 and earlier, WZR-450HP-CWT firmware Ver. 2.00 and earlier, WZR-450HP-UB firmware Ver. 2.00 and earlier, WZR-600DHP2 firmware Ver. 1.15 and earlier, and WZR-D1100H firmware Ver. 2.00 and earlier. | 2022-12-07 | not yet calculated | CVE-2022-34840 MISC MISC |
buildah -- buildah | A vulnerability was found in buildah. Incorrect following of symlinks while reading .containerignore and .dockerignore results in information disclosure. | 2022-12-08 | not yet calculated | CVE-2022-4122 MISC MISC |
buildah -- buildah | A flaw was found in Buildah. The local path and the lowest subdirectory may be disclosed due to incorrect absolute path traversal, resulting in an impact to confidentiality. | 2022-12-08 | not yet calculated | CVE-2022-4123 MISC |
canon_medical_informatics -- vitrea_vision | Canon Medical Informatics Vitrea Vision 7.7.76.1 does not adequately enforce access controls. An authenticated user is able to gain unauthorized access to imaging records by tampering with the vitrea-view/studies/search patientId parameter. | 2022-12-09 | not yet calculated | CVE-2022-38765 MISC |
certifi -- certifi | Certifi is a curated collection of Root Certificates for validating the trustworthiness of SSL certificates while verifying the identity of TLS hosts. Certifi 2022.12.07 removes root certificates from "TrustCor" from the root store. These are in the process of being removed from Mozilla's trust store. TrustCor's root certificates are being removed pursuant to an investigation prompted by media reporting that TrustCor's ownership also operated a business that produced spyware. Conclusions of Mozilla's investigation can be found in the linked google group discussion. | 2022-12-07 | not yet calculated | CVE-2022-23491 MISC MISC |
chicken -- chicken | egg-compile.scm in CHICKEN 5.x before 5.3.1 allows arbitrary OS command execution during package installation via escape characters in a .egg file. | 2022-12-10 | not yet calculated | CVE-2022-45145 MISC MISC MISC |
codecentric-- spring-boot-admin | Spring boot admins is an open source administrative user interface for management of spring boot applications. All users who run Spring Boot Admin Server, having enabled Notifiers (e.g. Teams-Notifier) and write access to environment variables via UI are affected. Users are advised to upgrade to the most recent releases of Spring Boot Admin 2.6.10 and 2.7.8 to resolve this issue. Users unable to upgrade may disable any notifier or disable write access (POST request) on `/env` actuator endpoint. | 2022-12-09 | not yet calculated | CVE-2022-46166 MISC MISC |
containerd -- containerd | containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers. | 2022-12-07 | not yet calculated | CVE-2022-23471 MISC MISC |
csliuwy -- coder-chain_gdut | A vulnerability has been found in csliuwy coder-chain_gdut and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /back/index.php/user/User/?1. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-215095. | 2022-12-07 | not yet calculated | CVE-2022-4341 N/A N/A |
cube-js -- cube-js | cube-js is a headless business intelligence platform. In version 0.31.23 all authenticated Cube clients could bypass SQL row-level security and run arbitrary SQL via the newly introduced /v1/sql-runner endpoint. This issue has been resolved in version 0.31.24. Users are advised to either upgrade to 0.31.24 or to downgrade to 0.31.22. There are no known workarounds for this vulnerability. | 2022-12-09 | not yet calculated | CVE-2022-23510 MISC MISC MISC |
daloradius -- daloradius | daloRADIUS is an open source RADIUS web management application. daloRadius 1.3 and prior are vulnerable to a combination cross site scripting (XSS) and cross site request forgery (CSRF) vulnerability which leads to account takeover in the mng-del.php file because of an unescaped variable reflected in the DOM on line 116. This issue has been addressed in commit `ec3b4a419e`. Users are advised to manually apply the commit in order to mitigate this issue. Users may also mitigate this issue with in two parts 1) The CSRF vulnerability can be mitigated by making the daloRadius session cookie to samesite=Lax or by the implimentation of a CSRF token in all forms. 2) The XSS vulnerability may be mitigated by escaping it or by introducing a Content-Security policy. | 2022-12-06 | not yet calculated | CVE-2022-23475 MISC MISC |
dhis2 -- dhis2-core | DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Through various features of DHIS2, an authenticated user may be able to upload a file which includes embedded javascript. The user could then potentially trick another authenticated user to open the malicious file in a browser which would trigger the javascript code, resulting in a cross-site scripting (XSS) attack. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. Users unable to upgrade may add the following simple CSP rule in your web proxy to the vulnerable endpoints: `script-src 'none'`. This workaround will prevent all javascript from running on those endpoints. | 2022-12-08 | not yet calculated | CVE-2022-41947 MISC MISC |
dhis2 -- dhis2-core | DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. Affected versions are subject to a privilege escalation vulnerability. A DHIS2 user with authority to manage users can assign superuser privileges to themself by manually crafting an HTTP PUT request. Only users with the following DHIS2 user role authorities can exploit this vulnerability. Note that in many systems the only users with user admin privileges are also superusers. In these cases, the escalation vulnerability does not exist. The vulnerability is only exploitable by attackers who can authenticate as users with the user admin authority. As this is usually a small and relatively trusted set of users, exploit vectors will often be limited. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. The only known workaround to this issue is to avoid the assignment of the user management authority to any users until the patch has been applied. | 2022-12-08 | not yet calculated | CVE-2022-41948 MISC |
dhis2 -- dhis2-core | DHIS 2 is an open source information system for data capture, management, validation, analytics and visualization. In affected versions an authenticated DHIS2 user can craft a request to DHIS2 to instruct the server to make requests to external resources (like third party servers). This could allow an attacker, for example, to identify vulnerable services which might not be otherwise exposed to the public internet or to determine whether a specific file is present on the DHIS2 server. DHIS2 administrators should upgrade to the following hotfix releases: 2.36.12.1, 2.37.8.1, 2.38.2.1, 2.39.0.1. At this time, there is no known workaround or mitigation for this vulnerability. | 2022-12-08 | not yet calculated | CVE-2022-41949 MISC MISC |
f5 -- big-ip | In all versions of BIG-IP, when running in Appliance mode, an authenticated user assigned the Administrator role may be able to bypass Appliance mode restrictions, utilizing an undisclosed iControl REST endpoint. A successful exploit can allow the attacker to cross a security boundary. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated. | 2022-12-07 | not yet calculated | CVE-2022-41800 MISC |
freshrss -- freshrss | FreshRSS is a free, self-hostable RSS aggregator. User configuration files can be accessed by a remote user. In addition to user preferences, such configurations contain hashed passwords (brypt with cost 9, salted) of FreshRSS Web interface. If the API is used, the configuration might contain a hashed password (brypt with cost 9, salted) of the GReader API, and a hashed password (MD5 salted) of the Fever API. Users should update to version 1.20.2 or edge. Users unable to upgrade can apply the patch manually or delete the file `./FreshRSS/p/ext.php`. | 2022-12-09 | not yet calculated | CVE-2022-23497 MISC MISC MISC |
funkwhale -- funkwhale | User invites for Funkwhale v1.2.8 do not permanently expire after being used for signup and can be used again after an account has been deleted. | 2022-12-09 | not yet calculated | CVE-2022-45292 MISC |
go-merkledag -- go-merkledag | go-merkledag implements the 'DAGService' interface and adds two ipld node types, Protobuf and Raw for the ipfs project. A `ProtoNode` may be modified in such a way as to cause various encode errors which will trigger a panic on common method calls that don't allow for error returns. A `ProtoNode` should only be able to encode to valid DAG-PB, attempting to encode invalid DAG-PB forms will result in an error from the codec. Manipulation of an existing (newly created or decoded) `ProtoNode` using the modifier methods did not account for certain states that would place the `ProtoNode` into an unencodeable form. Due to conformance with the [`github.com/ipfs/go-block-format#Block`](https://pkg.go.dev/github.com/ipfs/go-block-format#Block) and [`github.com/ipfs/go-ipld-format#Node`](https://pkg.go.dev/github.com/ipfs/go-ipld-format#Node) interfaces, certain methods, which internally require a re-encode if state has changed, will panic due to the inability to return an error. This issue has been addressed across a number of pull requests. Users are advised to upgrade to version 0.8.1 for a complete set of fixes. Users unable to upgrade may attempt to mitigate this issue by sanitising inputs when allowing user-input to set a new `CidBuilder` on a `ProtoNode` and by sanitising `Tsize` (`Link#Size`) values such that they are a reasonable byte-size for sub-DAGs where derived from user-input. | 2022-12-08 | not yet calculated | CVE-2022-23495 MISC MISC MISC MISC MISC MISC MISC MISC MISC |
go-standard_library -- os/net/http | On Windows, restricted files can be accessed via os.DirFS and http.Dir. The os.DirFS function and http.Dir type provide access to a tree of files rooted at a given directory. These functions permit access to Windows device files under that root. For example, os.DirFS("C:/tmp").Open("COM1") opens the COM1 device. Both os.DirFS and http.Dir only provide read-only filesystem access. In addition, on Windows, an os.DirFS for the directory (the root of the current drive) can permit a maliciously crafted path to escape from the drive and access any path on the system. With fix applied, the behavior of os.DirFS("") has changed. Previously, an empty root was treated equivalently to "/", so os.DirFS("").Open("tmp") would open the path "/tmp". This now returns an error. | 2022-12-07 | not yet calculated | CVE-2022-41720 MISC MISC MISC MISC |
go-standard_library/golang -- multiple_producst | An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests. HTTP/2 server connections contain a cache of HTTP header keys sent by the client. While the total number of entries in this cache is capped, an attacker sending very large keys can cause the server to allocate approximately 64 MiB per open connection. | 2022-12-08 | not yet calculated | CVE-2022-41717 MISC MISC MISC MISC MISC |
ibm -- cloud_transformation_advisor | IBM Cloud Transformation Advisor 2.0.1 through 3.3.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 237214. | 2022-12-09 | not yet calculated | CVE-2022-41299 MISC MISC |
interspire -- email_marketer | Interspire Email Marketer through 6.5.1 allows SQL Injection via the surveys module. An unauthenticated attacker could successfully perform an attack to extract potentially sensitive information from the database if the survey id exists. | 2022-12-09 | not yet calculated | CVE-2022-44790 MISC |
jetbrains -- gateway | In JetBrains JetBrains Gateway before 2022.3 a client could connect without a valid token if the host consented. | 2022-12-08 | not yet calculated | CVE-2022-46829 MISC |
jetbrains -- intellij_idea | In JetBrains IntelliJ IDEA before 2022.2.4 a buffer overflow in the fsnotifier daemon on macOS was possible. | 2022-12-08 | not yet calculated | CVE-2022-46824 MISC |
jetbrains -- intellij_idea | In JetBrains IntelliJ IDEA before 2022.3 the built-in web server leaked information about open projects. | 2022-12-08 | not yet calculated | CVE-2022-46825 MISC |
jetbrains -- intellij_idea | In JetBrains IntelliJ IDEA before 2022.3 the built-in web server allowed an arbitrary file to be read by exploiting a path traversal vulnerability. | 2022-12-08 | not yet calculated | CVE-2022-46826 MISC |
jetbrains -- intellij_idea | In JetBrains IntelliJ IDEA before 2022.3 an XXE attack leading to SSRF via requests to custom plugin repositories was possible. | 2022-12-08 | not yet calculated | CVE-2022-46827 MISC |
jetbrains -- intellij_idea | In JetBrains IntelliJ IDEA before 2022.3 a DYLIB injection on macOS was possible. | 2022-12-08 | not yet calculated | CVE-2022-46828 MISC |
jetbrains -- teamcity | In JetBrains TeamCity between 2022.10 and 2022.10.1 a custom STS endpoint allowed internal port scanning. | 2022-12-08 | not yet calculated | CVE-2022-46830 MISC |
jetbrains -- teamcity | In JetBrains TeamCity between 2022.10 and 2022.10.1 connecting to AWS using the "Default Credential Provider Chain" allowed TeamCity project administrators to access AWS resources normally limited to TeamCity system administrators. | 2022-12-08 | not yet calculated | CVE-2022-46831 MISC |
kbase_doc -- kbase_doc | Kbase Doc v1.0 was discovered to contain an arbitrary file deletion vulnerability via the component /web/IndexController.java. | 2022-12-09 | not yet calculated | CVE-2022-45290 MISC |
labstack -- labstack | Due to improper sanitization of user input on Windows, the static file handler allows for directory traversal, allowing an attacker to read files outside of the target directory that the server has permission to read. | 2022-12-07 | not yet calculated | CVE-2020-36565 MISC MISC MISC |
linux -- linux | Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329). | 2022-12-07 | not yet calculated | CVE-2022-42328 MISC MLIST MLIST MLIST |
linux -- linux | Guests can trigger deadlock in Linux netback driver T[his CNA information record relates to multiple CVEs; the text explains which aspects/vulnerabilities correspond to which CVE.] The patch for XSA-392 introduced another issue which might result in a deadlock when trying to free the SKB of a packet dropped due to the XSA-392 handling (CVE-2022-42328). Additionally when dropping packages for other reasons the same deadlock could occur in case of netpoll being active for the interface the xen-netback driver is connected to (CVE-2022-42329). | 2022-12-07 | not yet calculated | CVE-2022-42329 MISC MLIST MLIST MLIST |
lirantal -- daloradius | Exposure of Sensitive System Information to an Unauthorized Control Sphere in GitHub repository lirantal/daloradius prior to master branch. | 2022-12-08 | not yet calculated | CVE-2022-4366 CONFIRM MISC |
m-files -- web | Incorrect Privilege Assignment in M-Files Web (Classic) in M-Files before 22.8.11691.0 allows low privilege user to change some configuration. | 2022-12-09 | not yet calculated | CVE-2022-4264 MISC |
metinfo -- metinfo | A Cross-Site Request Forgery (CSRF) in the Administrator List of MetInfo v7.7 allows attackers to arbitrarily add Super Administrator account. | 2022-12-07 | not yet calculated | CVE-2022-44849 MISC |
micro_focus -- operations_bridge_containerized | A potential vulnerability has been identified in Micro Focus Operations Bridge - Containerized. The vulnerability could be exploited by a malicious authenticated OBM (Operations Bridge Manager) user to run Java Scripts in the browser context of another OBM user. Please note: The vulnerability is only applicable if the Operations Bridge Manager capability is deployed. A potential vulnerability has been identified in Micro Focus Operations Bridge Manager (OBM). The vulnerability could be exploited by a malicious authenticated OBM user to run Java Scripts in the browser context of another OBM user. This issue affects: Micro Focus Micro Focus Operations Bridge Manager versions prior to 2022.11. Micro Focus Micro Focus Operations Bridge- Containerized versions prior to 2022.11. | 2022-12-08 | not yet calculated | CVE-2022-38754 MISC MISC MISC |
mingsoft -- mcms | A vulnerability was found in Mingsoft MCMS up to 5.2.9. It has been classified as critical. Affected is an unknown function of the file /cms/category/list. The manipulation of the argument sqlWhere leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 5.2.10 is able to address this issue. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-215196. | 2022-12-09 | not yet calculated | CVE-2022-4375 MISC MISC |
morontt -- zend-blog-number-2 | A vulnerability was found in morontt zend-blog-number-2. It has been classified as problematic. Affected is an unknown function of the file application/forms/Comment.php of the component Comment Handler. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The name of the patch is 36b2d4abe20a6245e4f8df7a4b14e130b24d429d. It is recommended to apply a patch to fix this issue. VDB-215250 is the identifier assigned to this vulnerability. | 2022-12-10 | not yet calculated | CVE-2022-4397 N/A N/A |
netgear -- nighthawk_rax30 | A network misconfiguration is present in versions prior to 1.0.9.90 of the NETGEAR RAX30 AX2400 series of routers. IPv6 is enabled for the WAN interface by default on these devices. While there are firewall restrictions in place that define access restrictions for IPv4 traffic, these restrictions do not appear to be applied to the WAN interface for IPv6. This allows arbitrary access to any services running on the device that may be inadvertently listening via IPv6, such as the SSH and Telnet servers spawned on ports 22 and 23 by default. This misconfiguration could allow an attacker to interact with services only intended to be accessible by clients on the local network. | 2022-12-09 | not yet calculated | CVE-2022-4390 MISC MISC |
nortonlifelock -- avast_antivirus | The aswjsflt.dll library from Avast Antivirus windows contained a potentially exploitable heap corruption vulnerability that could enable an attacker to bypass the sandbox of the application it was loaded into, if applicable. This issue was fixed in version 18.0.1478 of the Script Shield Component. | 2022-12-08 | not yet calculated | CVE-2022-4291 MISC |
openharmony -- openharmony | Kernel subsystem within OpenHarmony-v3.1.4 and prior versions in kernel_liteos_a has a kernel stack overflow vulnerability when call SysClockGetres. 4 bytes padding data from kernel stack are copied to user space incorrectly and leaked. | 2022-12-08 | not yet calculated | CVE-2022-41802 MISC |
openharmony -- openharmony | The appspawn and nwebspawn services within OpenHarmony-v3.1.2 and prior versions were found to be vulnerable to buffer overflow vulnerability due to insufficient input validation. An unprivileged malicious application would be able to gain code execution within any application installed on the device or cause application crash. | 2022-12-08 | not yet calculated | CVE-2022-44455 MISC |
openharmony -- openharmony | OpenHarmony-v3.1.2 and prior versions had a vulnerability that telephony in communication subsystem sends public events with personal data, but the permission is not set. Malicious apps could listen to public events and obtain information such as mobile numbers and SMS data without permissions. | 2022-12-08 | not yet calculated | CVE-2022-45118 MISC |
openharmony -- openharmony | OpenHarmony-v3.1.4 and prior versions had an vulnerability. PIN code is transmitted to the peer device in plain text during cross-device authentication, which reduces the difficulty of man-in-the-middle attacks. | 2022-12-08 | not yet calculated | CVE-2022-45877 MISC |
pb-cms -- pb-cms | A vulnerability was found in LinZhaoguan pb-cms 2.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /blog/comment of the component Message Board. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-215114 is the identifier assigned to this vulnerability. | 2022-12-08 | not yet calculated | CVE-2022-4354 MISC MISC |
pb-cms -- pb-cms | A vulnerability has been found in LinZhaoguan pb-cms 2.0 and classified as problematic. Affected by this vulnerability is the function IpUtil.getIpAddr. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-215113 was assigned to this vulnerability. | 2022-12-08 | not yet calculated | CVE-2022-4353 MISC MISC |
perl -- perl | The rxvt-unicode package is vulnerable to a remote code execution, in the Perl background extension, when an attacker can control the data written to the user's terminal and certain options are set. | 2022-12-09 | not yet calculated | CVE-2022-4170 MISC MISC |
prestashop -- prestashop | PrestaShop is an open-source e-commerce solution. Versions prior to 1.7.8.8 did not properly restrict host filesystem access for users. Users may have been able to view the contents of the upload directory without appropriate permissions. This issue has been addressed and users are advised to upgrade to version 1.7.8.8. There are no known workarounds for this issue. | 2022-12-08 | not yet calculated | CVE-2022-46158 MISC MISC |
qubes-mirage-firewall -- qubes-mirage-firewall | qubes-mirage-firewall (aka Mirage firewall for QubesOS) 0.8.x through 0.8.3 allows guest OS users to cause a denial of service (CPU consumption and loss of forwarding) via a crafted multicast UDP packet (IP address range of 224.0.0.0 through 239.255.255.255). | 2022-12-07 | not yet calculated | CVE-2022-46770 MISC |
radareorg -- radareorg/radare2 | Integer Overflow or Wraparound in GitHub repository radareorg/radare2 prior to 5.8.0. | 2022-12-10 | not yet calculated | CVE-2022-4398 MISC CONFIRM |
rapid7 -- nexpose_and_insightvm | Rapid7 Nexpose and InsightVM versions prior to 6.6.172 failed to reliably validate the authenticity of update contents. This failure could allow an attacker to provide a malicious update and alter the functionality of Rapid7 Nexpose. The attacker would need some pre-existing mechanism to provide a malicious update, either through a social engineering effort, privileged access to replace downloaded updates in transit, or by performing an Attacker-in-the-Middle attack on the update service itself. | 2022-12-08 | not yet calculated | CVE-2022-4261 CONFIRM CONFIRM CONFIRM |
red_hat -- openshift | Openshift 4.9 does not use HTTP Strict Transport Security (HSTS) which may allow man-in-the-middle (MITM) attacks. | 2022-12-09 | not yet calculated | CVE-2022-3259 MISC |
red_hat -- openshift | The response header has not enabled X-FRAME-OPTIONS, Which helps prevents against Clickjacking attack.. Some browsers would interpret these results incorrectly, allowing clickjacking attacks. | 2022-12-08 | not yet calculated | CVE-2022-3260 MISC |
red_hat -- openshift | A flaw was found in Openshift. A pod with a DNSPolicy of "ClusterFirst" may incorrectly resolve the hostname based on a service provided. This flaw allows an attacker to supply an incorrect name with the DNS search policy, affecting confidentiality and availability. | 2022-12-08 | not yet calculated | CVE-2022-3262 MISC |
reputeinfosystems -- armember | Unauth. Privilege Escalation vulnerability in ARMember premium plugin <= 5.5.1 on WordPress. | 2022-12-06 | not yet calculated | CVE-2022-42888 MISC |
s-cms -- s-cms | A vulnerability was found in S-CMS 5.0 Build 20220328. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Contact Information Page. The manipulation of the argument Make a Call leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-215197 was assigned to this vulnerability. | 2022-12-09 | not yet calculated | CVE-2022-4377 N/A N/A |
samsung -- calendar | Improper access control vulnerability in Calendar prior to versions 11.6.08.0 in Android Q(10), 12.2.11.3000 in Android R(11), 12.3.07.2000 in Android S(12), and 12.4.02.0 in Android T(13) allows attackers to access sensitive information via implicit intent. | 2022-12-08 | not yet calculated | CVE-2022-39915 MISC |
samsung -- decoding_library | Integer overflow vulnerability in Samsung decoding library for video thumbnails prior to SMR Dec-2022 Release 1 allows local attacker to perform Out-Of-Bounds Write. | 2022-12-08 | not yet calculated | CVE-2022-39907 MISC |
samsung -- decoding_library | TOCTOU vulnerability in Samsung decoding library for video thumbnails prior to SMR Dec-2022 Release 1 allows local attacker to perform Out-Of-Bounds Write. | 2022-12-08 | not yet calculated | CVE-2022-39908 MISC |
samsung -- displaymanagerservice | Exposure of Sensitive Information from an Unauthorized Actor vulnerability in Samsung DisplayManagerService prior to Android T(13) allows local attacker to access connected DLNA device information. | 2022-12-08 | not yet calculated | CVE-2022-39914 MISC |
samsung -- exynos_baseband | Improper authentication in Exynos baseband prior to SMR DEC-2022 Release 1 allows remote attacker to disable the network traffic encryption between UE and gNodeB. | 2022-12-08 | not yet calculated | CVE-2022-39901 MISC |
samsung -- gear_iconx_pc_manager | Insufficient verification of data authenticity vulnerability in Samsung Gear IconX PC Manager prior to version 2.1.221019.51 allows local attackers to create arbitrary file using symbolic link. | 2022-12-08 | not yet calculated | CVE-2022-39909 MISC |
samsung -- iiccphonebook | Improper access control vulnerability in IIccPhoneBook prior to SMR Dec-2022 Release 1 allows attackers to access some information of usim. | 2022-12-08 | not yet calculated | CVE-2022-39898 MISC |
samsung -- nice_catch | Improper access control vulnerability in Nice Catch prior to SMR Dec-2022 Release 1 allows physical attackers to access contents of all toast generated in the application installed in Secure Folder through Nice Catch. | 2022-12-08 | not yet calculated | CVE-2022-39900 MISC |
samsung -- pass | Improper access control vulnerability in Samsung Pass prior to version 4.0.06.7 allow physical attackers to access data of Samsung Pass on a certain state of an unlocked device using pop-up view. | 2022-12-08 | not yet calculated | CVE-2022-39910 MISC |
samsung -- pass | Improper check or handling of exceptional conditions vulnerability in Samsung Pass prior to version 4.0.06.1 allows attacker to access Samsung Pass. | 2022-12-08 | not yet calculated | CVE-2022-39911 MISC |
samsung -- persona_manager | Exposure of Sensitive Information to an Unauthorized Actor in Persona Manager prior to Android T(13) allows local attacker to access user profiles information. | 2022-12-08 | not yet calculated | CVE-2022-39913 MISC |
samsung -- personamanagerservice | Improper handling of insufficient permissions vulnerability in setSecureFolderPolicy in PersonaManagerService prior to Android T(13) allows local attackers to set some setting value in Secure folder. | 2022-12-08 | not yet calculated | CVE-2022-39912 MISC |
samsung -- rcs_call | Improper access control vulnerability in RCS call prior to SMR Dec-2022 Release 1 allows local attackers to access RCS incoming call number. | 2022-12-08 | not yet calculated | CVE-2022-39903 MISC |
samsung -- sectelephonyprovider | Improper access control vulnerability in SecTelephonyProvider prior to SMR Dec-2022 Release 1 allows attackers to access message information. | 2022-12-08 | not yet calculated | CVE-2022-39906 MISC |
samsung -- settings | Exposure of Sensitive Information vulnerability in Samsung Settings prior to SMR Dec-2022 Release 1 allows local attackers to access the Network Access Identifier via log. | 2022-12-08 | not yet calculated | CVE-2022-39904 MISC |
samsung -- windowmanagerservice | Improper authentication vulnerability in Samsung WindowManagerService prior to SMR Dec-2022 Release 1 allows attacker to send the input event using S Pen gesture. | 2022-12-08 | not yet calculated | CVE-2022-39899 MISC |
secomea -- gatemanager | A vulnerability in the web server of Secomea GateManager allows a local user to impersonate as the previous user under some failed login conditions. This issue affects: Secomea GateManager versions from 9.4 through 9.7. | 2022-12-09 | not yet calculated | CVE-2022-2752 MISC |
secustation -- multiple_products | In certain Secustation products the administrator account password can be read. This affects V2.5.5.3116-S50-SMA-B20171107A, V2.3.4.1301-M20-TSA-B20150617A, V2.5.5.3116-S50-RXA-B20180502A, V2.5.5.3116-S50-SMA-B20190723A, V2.5.5.3116-S50-SMB-B20161012A, V2.3.4.2103-S50-NTD-B20170508B, V2.5.5.3116-S50-SMB-B20160601A, V2.5.5.2601-S50-TSA-B20151229A, and V2.5.5.3116-S50-SMA-B20170217. | 2022-12-08 | not yet calculated | CVE-2022-40939 MISC MISC |
seeddms -- seeddms | Weak reset token generation in SeedDMS v6.0.20 and v5.1.7 allows attackers to execute a full account takeover via a brute force attack. | 2022-12-08 | not yet calculated | CVE-2022-44938 MISC |
sentry -- sentry | Sentry is an error tracking and performance monitoring platform. In versions of the sentry python library prior to 22.11.0 an attacker with a known valid invite link could manipulate a cookie to allow the same invite link to be reused on multiple accounts when joining an organization. As a result an attacker with a valid invite link can create multiple users and join an organization they may not have been originally invited to. This issue was patched in version 22.11.0. Sentry SaaS customers do not need to take action. Self-hosted Sentry installs on systems which can not upgrade can disable the invite functionality until they are ready to deploy the patched version by editing their `sentry.conf.py` file (usually located at `~/.sentry/`). | 2022-12-10 | not yet calculated | CVE-2022-23485 MISC |
shift_tech_inc -- bingo!cms | Authentication bypass using an alternate path or channel vulnerability in bingo!CMS version1.7.4.1 and earlier allows a remote unauthenticated attacker to upload an arbitrary file. As a result, an arbitrary script may be executed and/or a file may be altered. | 2022-12-07 | not yet calculated | CVE-2022-42458 MISC MISC |
six_apart_ltd -- movable_type | Improper neutralization of Server-Side Includes (SSW) within a web page in Movable Type series allows a remote authenticated attacker with Privilege of 'Manage of Content Types' may execute an arbitrary Perl script and/or an arbitrary OS command. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier. | 2022-12-07 | not yet calculated | CVE-2022-43660 MISC MISC |
six_apart_ltd -- movable_type | Improper validation of syntactic correctness of input vulnerability exist in Movable Type series. Having a user to access a specially crafted URL may allow a remote unauthenticated attacker to set a specially crafted URL to the Reset Password page and conduct a phishing attack. Affected products/versions are as follows: Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier. | 2022-12-07 | not yet calculated | CVE-2022-45113 MISC MISC |
six_apart_ltd -- movable_type | Cross-site scripting vulnerability in Movable Type Movable Type 7 r.5301 and earlier (Movable Type 7 Series), Movable Type Advanced 7 r.5301 and earlier (Movable Type Advanced 7 Series), Movable Type 6.8.7 and earlier (Movable Type 6 Series), Movable Type Advanced 6.8.7 and earlier (Movable Type Advanced 6 Series), Movable Type Premium 1.53 and earlier, and Movable Type Premium Advanced 1.53 and earlier allows a remote unauthenticated attacker to inject an arbitrary script. | 2022-12-07 | not yet calculated | CVE-2022-45122 MISC MISC |
teledyne flir -- ax8 | A vulnerability classified as critical has been found in Teledyne FLIR AX8 up to 1.46.16. Affected is an unknown function of the file palette.php of the component Web Service Handler. The manipulation of the argument palette leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-215118 is the identifier assigned to this vulnerability. | 2022-12-08 | not yet calculated | CVE-2022-4364 N/A N/A |
teleport -- teleport | Teleport v3.2.2, Teleport v3.5.6-rc6, and Teleport v3.6.3-b2 was discovered to contain an information leak via the /user/get-role-list web interface. | 2022-12-08 | not yet calculated | CVE-2022-38599 MISC MISC |
ticklishhoneybee -- nodau | A vulnerability was found in TicklishHoneyBee nodau. It has been rated as critical. Affected by this issue is some unknown functionality of the file src/db.c. The manipulation of the argument value/name leads to sql injection. The name of the patch is 7a7d737a3929f335b9717ddbd31db91151b69ad2. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-215252. | 2022-12-10 | not yet calculated | CVE-2022-4399 MISC MISC MISC |
tinymce -- tinymce | tinymce is an open source rich text editor. A cross-site scripting (XSS) vulnerability was discovered in the alert and confirm dialogs when these dialogs were provided with malicious HTML content. This can occur in plugins that use the alert or confirm dialogs, such as in the `image` plugin, which presents these dialogs when certain errors occur. The vulnerability allowed arbitrary JavaScript execution when an alert presented in the TinyMCE UI for the current user. This vulnerability has been patched in TinyMCE 5.10.7 and TinyMCE 6.3.1 by ensuring HTML sanitization was still performed after unwrapping invalid elements. Users are advised to upgrade to either 5.10.7 or 6.3.1. Users unable to upgrade may ensure the the `images_upload_handler` returns a valid value as per the images_upload_handler documentation. | 2022-12-08 | not yet calculated | CVE-2022-23494 MISC MISC MISC MISC MISC MISC |
traefik -- traefik | Traefik is an open source HTTP reverse proxy and load balancer. Versions prior to 2.9.6 are subject to a potential vulnerability in Traefik displaying the Authorization header in its debug logs. In certain cases, if the log level is set to DEBUG, credentials provided using the Authorization header are displayed in the debug logs. Attackers must have access to a users logging system in order for credentials to be stolen. This issue has been addressed in version 2.9.6. Users are advised to upgrade. Users unable to upgrade may set the log level to `INFO`, `WARN`, or `ERROR`. | 2022-12-08 | not yet calculated | CVE-2022-23469 MISC MISC MISC |
traefik -- traefik | Traefik is an open source HTTP reverse proxy and load balancer. In affected versions there is a potential vulnerability in Traefik managing TLS connections. A router configured with a not well-formatted TLSOption is exposed with an empty TLSOption. For instance, a route secured using an mTLS connection set with a wrong CA file is exposed without verifying the client certificates. Users are advised to upgrade to version 2.9.6. Users unable to upgrade should check their logs to detect the error messages and fix your TLS options. | 2022-12-08 | not yet calculated | CVE-2022-46153 MISC MISC MISC MISC |
trendnet -- wireless_ac_easy-upgrader_tew-820ap | A stack overflow vulnerability exists in TrendNet Wireless AC Easy-Upgrader TEW-820AP (Version v1.0R, firmware version 1.01.B01) which may result in remote code execution. | 2022-12-07 | not yet calculated | CVE-2022-44373 MISC |
typora -- typora | Typora versions prior to 1.4.4 fails to properly neutralize JavaScript code, which may result in executing JavaScript code contained in the file when opening a file with the affected product. | 2022-12-07 | not yet calculated | CVE-2022-43668 MISC MISC |
western_digital -- my_cloud | Improper Authentication vulnerability in the encrypted volumes and auto mount features of Western Digital My Cloud devices allows insecure direct access to the drive information in the case of a device reset. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux. | 2022-12-09 | not yet calculated | CVE-2022-29838 MISC |
western_digital -- my_cloud | Insufficiently Protected Credentials vulnerability in the remote backups application on Western Digital My Cloud devices that could allow an attacker who has gained access to a relevant endpoint to use that information to access protected data. This issue affects: Western Digital My Cloud My Cloud versions prior to 5.25.124 on Linux. | 2022-12-09 | not yet calculated | CVE-2022-29839 MISC |
wireshark -- wireshark | Crash in the USB HID protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file on Windows | 2022-12-09 | not yet calculated | CVE-2022-3724 MISC MISC CONFIRM |
xen_project -- xen | Guests can trigger NIC interface reset/abort/crash via netback It is possible for a guest to trigger a NIC interface reset/abort/crash in a Linux based network backend by sending certain kinds of packets. It appears to be an (unwritten?) assumption in the rest of the Linux network stack that packet protocol headers are all contained within the linear section of the SKB and some NICs behave badly if this is not the case. This has been reported to occur with Cisco (enic) and Broadcom NetXtrem II BCM5780 (bnx2x) though it may be an issue with other NICs/drivers as well. In case the frontend is sending requests with split headers, netback will forward those violating above mentioned assumption to the networking core, resulting in said misbehavior. | 2022-12-07 | not yet calculated | CVE-2022-3643 MISC MLIST |
yauaa -- yauaa | Yet Another UserAgent Analyzer (Yauaa) is a java library that tries to parse and analyze the useragent string and extract as many relevant attributes as possible. Applications using the Client Hints analysis feature introduced with 7.0.0 can crash because the Yauaa library throws an ArrayIndexOutOfBoundsException. If uncaught the exception will result in a program crash. Applications that do not use this feature are not affected. Users are advised to upgrade to version 7.9.0. Users unable to upgrade may catch and discard any ArrayIndexOutOfBoundsException thrown by the Yauaa library. | 2022-12-08 | not yet calculated | CVE-2022-23496 MISC MISC |
yii -- gii | Yii Yii2 Gii through 2.2.4 allows stored XSS by injecting a payload into any field. | 2022-12-09 | not yet calculated | CVE-2022-34297 MISC |
zephyr -- zephyr | There is an error in the condition of the last if-statement in the function smp_check_keys. It was rejecting current keys if all requirements were unmet. | 2022-12-09 | not yet calculated | CVE-2022-2993 MISC |
zkteco -- xiamen_information_technology_zkbio_eco_adms | ZKTeco Xiamen Information Technology ZKBio ECO ADMS <=3.1-164 is vulnerable to Cross Site Scripting (XSS). | 2022-12-09 | not yet calculated | CVE-2022-44213 MISC |
Please share your thoughts
We recently updated our anonymous product survey; we’d welcome your feedback.